Submissions from 2006
Empowering International and Culturally Diverse Honours and Project Students Through Mentoring Activities, Leisa J. Armstrong and Sundrakanthi Singh
Fixture-scheduling for the Australian Football League using a Multi-objective Evolutionary Algorithm, Luigi Barone, Lyndon While, Paul Hughes, and Philip Hingston
The effects of light reduction treatments on mobile Epifaunain an Amphibolis Griffithii (black) den Hartog seagrass ecosystem, Helen Barwick
Security risk assessment: Group approach to a consensual outcome, Benjamin Beard and David J. Brooks
The effect of nitrogen source and concentration, medium pH and buffering on in vitro shoot growth and rooting in Eucalyptus marginata, Ian Bennett, Andrew Woodward, and Surachai Pusswonge
Strategies for the blocking of RFID tags, C Bolan
Do no harm: The use of RFID tags in a medical environment, Christopher Bolan
The Lazarus Effect: Resurrecting Killed RFID Tags, Christopher Bolan
Application of electrokinetic chromatography to food and beverages, Mary Boyce
Managing information security complexity, Murray Brand
Transformation theory and e-commerce adoption, Mark P. Brogan
Mapping the consensual knowledge of security risk management experts, David Brooks
Teaching Web Applications Development in a Fully Online Environment: Challenges, Approaches and Implementation, Justin Brown
What are they taking us for? The Participatory Nature of Western Australia's Regional Forest Agreement Process, Martin Brueckner, John Duff, Richard Mckenna, and Pierre Horwitz
Emus as non-standard seed dispersers and their potential for long-distance dispersal, Maria Calvino-Cancela, Robert Dunn, Eddie Van Etten, and Byron Lamont
Water stress vulnerability of four Banksia species in contrasting Ecohydrological habitats on the Gnangara Mound, Western Australia, Caroline Canham
Modelling layer 2 and layer 3 device bandwidth using B-Node theory, Steven Cikara, Stanislaw Maj, and David Thomas Shaw
A Composite User Authentication Architecture for Mobile Devices, Nathan Clarke and Steven Furnell
An automated sampling soil reduction-oxygenation RF sensor network for cereal crop management, Michael Collins, Christopher C. Holme, Keng T. Tan, and Leisa Armstrong
Opening Pandora's box: Teacher librarianship in the twenty-first century, Barbara Combes
Techno savvy and all-knowing or techno-oriented? Information seeking behaviour and the Net Generation, Barbara Combes
Techno savvy or techno oriented: Who are the Net Generation?, Barbara Combes
Visions of learning (ASLA Online II Conference Preceedings), Barbara Combes
Supporting first year e-learners in courses for the information professions, Barbara Combes and Karen Anderson
Influence of different volumes and types of detached macrophytes on fish community structure in surf zones of sandy beaches, Karen Crawley, Glenn Hyndes, and Susanne Ayvazian
Detached macrophyte accumulations in surf zones: Significance of macrophyte type and volume in supporting secondary production, Karen Ruth Crawley
Does your wireless LAN have criminal intent?, Michael Crowley and Andrew Woodward
Coastal aquaculture and conservation can work together, Tim Dempster, Pablo Sanchez-Jerez, Fernando Tuya, Damian Fernandez-Jover, Just Bayle-Sempere, Arturo Boyra, and Ricardo Haroun
Groundwater-Dependent Ecosystems: The Where, What and Why of GDEs, Derek Eamus and Raymond Froend
A Functional Methodology for Determining the Groundwater Regime Needed to Maintain the Health of Groundwater-Dependent Vegetation, Derek Eamus, Raymond Froend, Robyn Loomes, Grant Hose, and Brad Murray
Guia visual de Especies Marinas de Canarias, Fernando Espino, Arturo Boyra, Fernando Tuya, and Ricardo J Haroun
Security-relevant semantic patterns of BPEL in cross-organisational business processes, K P Fischer, U Bleimann, W Fuhrmann, and S M. Furnell
Differences in kelp morphology between wave sheltered and exposed localities: Morphologically plastic or fixed traits?, Meegan Fowler-Walker, Thomas Wernberg, and Sean Connell
Defining Phreatophyte Response to Reduced Water Availability: Preliminary Investigations on the Use of Xylem Cavitation Vulnerability in Banksia Woodland Species, Raymond Froend and Paul Drake
The challenges of understanding and using security: A survey of end-users, Steven Furnell, A Jusoh, and D Katsabas
Determining carbon and nitrogen stable isotope discrimination for marine consumers, Emily N. Gates
Assessing the usability of WLAN security for SOHO users, Bogdan Ghita and Steven Furnell
The challenges of ITIL implementations, Jason Gray
A Study of the Impact of the Affect Heuristic on the Risk Perception of Security Experts, Zack A. Gurdon
A methodology for the examination of the effectiveness of secure erasure tools running on Windows XP - research in progress, Anthony Hadfield, Michael Ahern, Leo Sell, and Andrew Woodward
The implementation of E-mail content management in a large corporation, Keir Hansen and Craig Valli
Reintroduction ecology of mala (Lagorchestes hirsutus) and merrnine (Lagostrophus fasciatus) at Shark Bay, Western Australia, Blair Hardman
Importance of diurnal refugia to a hare-wallaby reintroduction in Western Australia, Blair Hardman and Dorian Moro
The influence of seabird-derived nutrients on island ecosystems in the oligotrophic marine waters of south-western Australia, Sofie A. Harrison
Security issues of IEEE 802.16 (WiMAX), Jamshed Hasan
Living on the edge of two changing worlds: forecasting the responses of rocky intertidal ecosystems to climate change, Brian Helmuth, Nova Mieszkowska, Philippa Moore, and Stephen Hawkins
Learning and capacity building for irrigators in Western Australia's East Wanneroo Area: A theoretical framework for educational provision and a sketch of the socioecological context, Nan Hewitt and Pierre Horwitz
Organisational barriers and their relationship to the effective use of information system audit trails, Michael Hicks
Multi-level ranking for constrained multi-objective evolutionary optimisation, Philip Hingston, Luigi Barone, Simon Huband, and Lyndon While
Teaching an Undergraduate AI Course with Games and Simulation, Philip Hingston, Barbara Combes, and Martin Masek
Volatile Organic Compounds in Selected Micro-Environments, Andrea Hinwood, Henry Berko, Drew Farrar, Ian Galbally, and Ian Weeks
The relationship between changes in daily air pollution and hospitalizations in Perth, Australia 1992-1998: A case-cross over study, Andrea L. Hinwood, Nick de Klerk, Clemencia Rodriguez, Peter Jacoby, Tina Runnion, Peter Rye, Louis Landau, Frank Murray, Mark Feldwick, and Jeff Spickett
Acid Sulphate Soil Disturbance and metals in groundwater: Implications for human exposure through home grown produce, Andrea L. Hinwood, Pierre Horwitz, Stephen J. Appleyard, Caroline Barton, and Magda Wajrak
Movement patterns and habitat usage of Shark Bay dugongs, David K. Holley
Personal Monitoring of Benzene in Perth, Western Australia: The Contribution of Sources to Non-Industrial Personal Exposure, Anthony Horton, Frank Murray, Max Bulsara, Andrea Hinwood, and Drew Farrar
A Review of Multi-objective Test Problems and a Scalable Test Problem Toolkit, Simon Huband, Philip Hingston, Luigi Barone, and Lyndon While
Maximising overall value in plant design, Simon Huband, David Tuppurainen, Lyndon While, Luigi Barone, Philip Hingston, and Ted Bearman
Economic Optimisation of an Ore Processing Plant with a Constrained Multi-objective Evolutionary Algorithm, Simon Huband, Lyndon While, David Tupperainen, Philip Hingston, Luigi Barone, and Ted Bearman
Use of a weighted matching algorithm to sequence clusters in spatial join processing, Husen Husen
Information Terrorism: networked influence, William Hutchinson
Information Warfare and Deception, William Hutchinson
Laughter and Humour as a Influence Agent in Contenporary Information, William Hutchinson
Enterprise Computer Forensics: A defensive and offensive strategy to fight computer crime, Fahmid Imitaz
Honeypots: How do you know when you are inside one?, Simon Innes and Craig Valli
The 2006 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market, Andrew Jones, Craig Valli, Iain Sutherland, and Paula Thomas
A global review of information remaining on disks disposed of by organisations, Andy Jones
A review of landholder motivations and determinants for participation in conservation covenanting programmes, Thomas Kabii and Pierre Horwitz
Evaluation of end-user application security from a usability perspective, Dimitris Katsabas, Steven Furnell, and Paul Dowland
Electronic surveillance in hospitals: A review, Sue Kennedy
Sources of nitrogen and phosphorus in stormwater drainage from established residential areas and options for improved management, Surasithe Khwanboonbumpen
Risks and responsibilities in establishing a wireless network for an educational institution, Leigh Knights, Matt Fonceca, Georgina Mack, and Andrew Woodward
An authentic on-line learning environment in university introductory biology, Annette Koenders
Risk and Restitution: Assessing how users establish online trust, Hazel Lacohee, Andy Phippen, and Steven Furnell
A Rough-Fuzzy Controller for Autonomous Mobile Robot Navigation, Chang Su Lee, Thomas Braunl, and Anthony Zaknich
Teamwork and Simulation in Hybrid Cognitive Architecture, Jinsong Leng, Colin Fyfe, and Lakhmi Jain
A new approach for firearm identification with hierarchical neural networks based on cartridge case images, Dongguang Li
Development of solar concentrator for photo-voltaic energy system, Dongguang Li
Optical thin-film design system with DGL global optimization algorithms, Dongguang Li
Wound measurement application, Dongguang Li
Websites Recommended by Australian Healthcare Practitioners' for Use by Overweight and Obese Adolescents, Rachel Mahncke and Leisa Armstrong
Secure transmission of shared electronic health records: A review, Rachel Mahncke and Patricia Williams
The ecology and behaviour of Varanus mertensi (Reptilia: Varanidae), Phillip J. Mayes
Validated age and growth of the sandbar shark, Carcharhinus plumbeus (Nardo 1827) in the waters off Western Australia, Rory Brian Mcauley, Colin Simpfendorfer, Glenn Hyndes, Richard Allison, Justin Chidlow, Stephen Newman, and Rod C Lenanton
Pit Lake Sustainability in Australia: What is it and How do I Get it?, Clint McCullough and Mark Lund
Microcosm testing of municipal sewage and green waste for full-scale remediation of an acid coal pit lake, in semi-arid tropical Australia, Clint McCullough, Mark Lund, and Joel May
Opportunities For Sustainable Mining Pit Lakes in Australia, Clinton Mccullough and Mark Lund
A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1 – “systems installed in a client's premises.”, Robert Mclaughlin and David J. Brooks
Species richness, density and cover of sponge assemblages on temperate reefs off Perth, Western Australia, Lea McQuillan
Enhancing the forensic ICQ logfile extraction tool, Kim Morfitt
Structural analysis of the log files of the ICQ client version 2003b, Kim Morfitt
A Forensic Log File Extraction Tool for ICQ Instant Messaging Clients, Kim Morfitt and Craig Valli
Achieving Automated Intrusion Response: A Prototype Implementation, Maria Papadaki and Steven Furnell
Pollen characteristics of grevillea species determined by in vitro germination, Rebecca Parsons
Nearshore sea temperature variability off Rottnest Island (Western Australia) derived from satellite data, Alan Pearce, Fabienne Faskel, and Glenn Hyndes
The Hillarys Transect (1): Seasonal and cross-shelf variability of physical and chemical water properties off Perth, Western Australia, 1996-98, Alan Pearce, Mervyn Lynch, and Christine Hanson
Atmospheric nitrogen deposition in world biodiversity hotspots: the need for a greater global perspective in assessing N deposition impacts, Gareth H Phoenix, W Kevin Hicks, Steve Cinderby, Johan Kuylenstierna, William Stock, Frank Dentener, Ken Giller, Amy Austin, Rod Lefroy, Ben Gimeno, Mike Ashmore, and Philip Ineson
Designing and explaining programs with a literate pseudocode, Geoffrey Roy
An assessment of threats of the Physical and MAC Address Layers in WiMAX/802.16, Krishnun Sansurooah
Taxonomy of computer forensics methodologies and procedures for digital evidence seizure, Krishnun Sansurooah
The Courage of their Convictions: Creating Cultural Landscapes in 1930s Western Australia, Joanna Sassoon