Submissions from 2006
Managing visitor impacts in the Australian Alps: a case study in informal track development and track recovery, Pascal Scherrer and Andrew Growcock
Managing Visitor Impacts Along Australia's Remote Kimberley Coast - The Forgotten Dimension of Balancing Country, Pascal Scherrer, Amanda J. Smith, and Ross Dowling
Mediated identification, David Thomas Shaw
A Digital forensic practitioner's guide to giving evidence in a court of law, Shayne Sherman
Hunt warm, rest cool: Bioenergetic efficiency underlying diel vertical migration of a benthic shark, David Sims, Victoria Wearmouth, Emily Southall, Jackie Hill, Philippa Moore, Kate Rawlinson, Neil Hutchinson, Georgina Budd, David Righton, Julian Metcalfe, J Nash, and David Morritt
Trends in the Development of Security Technology, Clifton Smith
Drying and re-wetting of organic wetland sediments: Biogeochemistry and implications for wetland management, Beate Sommer
Genetic diversity and gene flow in fragmented populations of the rare shrub, Calothamnus sp. Whicher, Sean Stankowski
Effects of water availability, nitrogen supply and atmospheric CO2 concentrations on plant nitrogen natural abundance values, William Stock and John Evans
Soil community structure and litter decomposition under irrigated Eucalyptus Globulus in South Western Australia, Derek J. Swarts
An attitude and perception study of wireless network usage in home environments, Patryk Szewczyk
Personal Firewalls - Testing Robustness, Patryk Szewczyk and Craig Valli
Preceptions of Problem Solving through a Pair Programming Technique, Julian Terry, Patricia Williams, and Rachel Mahncke
Spatio-temporal distribution patterns of the invasive macroalga Sargassum muticum within a Danish Sargassum-bed, Mads Thomsen, Thomas Wernberg, Peter Staehr, and Morten Pedersen
Spatial patterns and response to wave exposure of shallow water algal assemblages across the Canarian Archipelago: A multi-scaled approach, Fernando Tuya and Ricardo J Haroun
Is there a link between the type of habitat and the patterns of abundance of holothurians in shallow rocky reefs?, Fernando Tuya, Jose Hernandez, and Sabrina Clemente
Spatio-temporal variability in a key herbivore, the long-spined black sea urchin (Diadema antillarum, Echinodermata: Echinoidea) in the Canary Islands, Fernando Tuya, Leonor Ortega-Borges, Armando Rosario-Pinilla, and Ricardo J Haroun
Changes in demersal wild fish aggregations beneath a sea-cage fish farm after the cessation of farming, Fernando Tuya, Pablo Sanchez-Jerez, Tim Dempster, Arturo Boyra, and R Haroun
Assessment of the effectiveness of two marine reserves in the Canary Islands (eastern Atlantic), F. Tuya, C. Garcia-Diez, F. Espino, and R. J. Haroun
Tags at war: A review of the United States Department of Defence RFID tag data standard, Nadezda Urosevic and Christopher Bolan
An investigation into the use of information and communication technology (ICT) by senior educators in Thailand, Nattavee Utakrit
SQL Injection - Threats to Medical Systems: The Issues and Countermeasures, Craig Valli
The Insider Threat to Medical Records: Has the network Age Changed anything?, Craig Valli
Use of bootable Linux CDs for the delivery of educational course content, Craig Valli
Differences in trophic position among sympatric sea urchin species, Mathew Vanderklift, Gary Kendrick, and Albertus Smit
Belguim's intelligence community: new challenges and opportunities, Maarten Vanhorenbeeck
A comparison of logging and fire disturbance on biophysical attributes of the Northern jarrah forest, Alexander W. Watson
Telemedicine and the digital door doctor, Darren Webb and Patricia Williams
Scale of impact determines early post-disturbance assemblage structure in subtidal Fucus beds in the Baltic Sea (Bornholm, Denmark), Thomas Wernberg
Export of detached macroalgae from reefs to adjacent seagrass beds, Thomas Wernberg, Mathew Vanderklift, Jason How, and Paul Lavery
A Faster Algorithm for Calculating Hypervolume, Lyndon While, Philip Hingston, Luigi Barone, and Simon Huband
The Derivation of a Conceptual Model for IT Security Outsourcing, David Wilde, Matthew Warren, and William Hutchinson
Outsourcing system security: A theoretical perspective, W D Wilde, M J. Warren, and W Hutchinson
Forensics analysis of the contents of Nokia mobile phones, Brendan Williamson, Paul Apeldoorn, Ben Cheam, and Meaghan Mcdonald
Apprasing information security rituals in primary care medical practice, Patricia Williams
Making Research Real: Is Action Research a Suitable Methodology for Medical Information Security Investigations?, Patricia Williams
Security immunization using basic countermeasures, Patricia Williams
The role of standards in medical information security: an opportunity for improvement, Patricia Williams
Examination performance: Improvement through critical thinking, Patricia Williams and Rachel Mahncke
Primary care information security: a case study for practical assistance, Patricia Williams and Rachel Mahncke
Shared Electronic Health Records: A changing landscape for security in medical practice, Patricia Williams and Rachel Mahncke
An investigation into a community information database system in the northeast of Thailand: Community empowerment through community learning centres, Chumnong Wongchachom
Data Security and wireless networks - mutually exclusive?, Andrew Woodward
LIARS: Laptop Inspector and Recovery System, Andrew Woodward
A Comparison of Heuristics for Scheduling Spatial Clusters to Reduce I/O Cost in Spatial Join Processing, Jitian Xiao
Agent-based Similarity-aware Web Document Pre-fetching, Jitian Xiao
Clustering Spatial Data for Join Operations Using Match-based Partition, Jitian Xiao
Reformulation of the Generation of Conformance Testing Sequences to the Asymmetric Travelling Salesman Problem, Jitian Xiao, Chiou Peng Lam, Huaizhong Li, and Jun Wang
Leading hackers down the garden path, Suen Yek
Submissions from 2005
Taxonomy of WRT54G(S) Hardware and Custom Firmware, Marwan Al-Zarouni
A discussion on developing online learning communities for student information professionals, Karen Anderson
Teaching about electronic records in an online learning environment, Karen Anderson
Shaping the landscape: Fire–grazer interactions in an African Savanna, S Archibald, W J. Bond, William Stock, and D H. Fairbanks
The Role of an Online Community to Support Overweight Adolescents: A Survey of Australian Healthcare Professionals. Research in Progress, Leisa Armstrong and Rachel J. Mahncke
A salt on the land: The osmolyte production and physiological responses of selected Myrtaceae species exposed to salt and water stress, Janelle Atkinson
Application of a novel phytotoxicity assay for the detection of herbicides in Hervey Bay and the Great Sandy Straits, Susan Bengston-Nash, Kathryn Mcmahon, Geoff Eaglesham, and Joachin Muller
RFID-Evaluation of Tag Security Schemes, Christopher Bolan
The Growth of 802.11b and 802.11g Networks in the Perth CBD, Western Australia, Christopher Bolan
The introduction of RFID Security into computer security courses, Christopher Bolan
The Effect of Contractors on Project Success: What the Literature Doesn't Say, Sue Bolton and Donald Mcdermid
Stable isotope composition of faeces as an indicator of seasonal diet selection in wild herbivores in southern Africa, Susan Botha and William Stock
Network Analysis Methods and Tools for Sme C-Commerce, Mark Brogan
C-Commerce Innovation: Unravelling the effects of knowledge ties on embedded network structure, Mark Brogan and Leisa Armstrong
Is CCTV a social benefit? Is psychometric study of perceived social risk, David Brooks
An exploration of student performance, utilization, and attitude to the use of a controlled content sequencing web based learning environment, Justin A. Brown
Towards persistent resource identification with the uniform resource name, Luke Brown
The systematics of the reducta complex of the burrowing freshwater crayfish Engaewa Riek, Quinton Burnham
Why 'A forest conscienceness'?, Michael C. Calver, Heidi Bigler-Cole, Geoffery Bolton, John Dargavel, Andrea Gaynor, Pierre Horwitz, Jenny Mills, and G Wardell-Johnson
AD2US: An Automated Approach to Generating Usage Scenarios from UML Activity Diagrams, Robert Chandler, Chiou Peng Lam, and Huaizhong Li
A Finite State Grammar Based Decoding Method, Chaiyaporn Chirathamjaree
A method for the inference of non-recursive finite-state grammars, Chaiyaporn Chirathamjaree
An Apporach to Integrate Heterogeneous Data Sources, Chaiyaporn Chirathamjaree
An Inference Method for Non-Recursive Context-Free Grammars, Chaiyaporn Chirathamjaree
The use of formal grammars in isolated word recognition, Chaiyaporn Chirathamjaree
Method for Real-Time Non-Intrusive Video-Based Eye-Gaze Tracking, Joanne Church
Authentication of users on mobile telephones - A survey of attitudes and practices, Nathan Clarke and Steven Furnell
User Authentication for Mobile Devices: A Composite Approach, Nathan Clarke and Steven Furnell
The ultimate support package: educated library technicians in schools, Judith Clayden
Multiple Intelligences in Secondary Schools, Brenda Clover
Storybook: Creating a personalised learning environment for children isolated by severe learning disabilities, Michael Collins and Joanne Church
StoryBook: Extending a personalised interactive learning environment to children with severe learning disabilities, Michael Collins and Sundrakanthi Singh
Computers, ICTs and Online Curriculum: A Role for the Teacher Librarian, Barbara Combes
From smorgasbord to satisfying meal: An holistic approach to information literacy and lifelong learning, Barbara Combes
The copy-and-paste culture of the Net Generation: Strategies for dealing with plagiarism, Barbara Combes
Influence of phenolics on micropropogation of Eucalyptus Marginata, Anetta Cutler-Staniek, Ian Bennett, and Mary Boyce
Seeking information superiority: Strategies for business in the commercial application of information operations, Martin Dart
A range extension for Lerista lineopunctulata and a second record of Lerista lineata, near Yalgorup, Western Australia, Robert Davis and M. Bamford
Embryonic Survival and Egg Numbers in Small and Large Populations of the Frog Heleioporus albopunctatus in Western Australia, Robert Davis and J Roberts
Population genetic structure of the western spotted frog, Heleioporus albopunctatus (Anura: Myobatrachidae), in a fragmented landscape in south-western Australia, Robert Davis and J. Roberts
A protection profiles approach to risk analysis for small and medium enterprises, Vassilis Dimopoulos and Steven Furnell
Issues of Australian IT: Security Outsourcing, Sneza Dojkovski, Matthew Warren, and William Hutchinson
An investigation into the paradox of organisational flexibility versus security: A research project overview, Rosanna Fanciulli
A Security Infrastructure for Cross-Domain Development of Script-Based Business Processes in SOC Environments, Klaus Fischer, Udo Bleimann, Woldemar Fuhrmann, and Steven Furnell
Why users cannot use security, Steven Furnell
Considering the role of academic qualifications for IT security professionals, Steven Furnell, Vasilis Katos, and Nathan Clarke
TCP performance estimation using neural networks modelling, Bogdan Ghita, Steven Furnell, Benn Lines, and Emmanuel Ifeachor
Human health and forested ecosystems: Exploring historical transitions of diseases and perceptions, Marisa Gilles and Pierre Horwitz
A regression algorithm for rock magnetic data mining, Wanwu Guo