Follow

Submissions from 2005

Link

A statistical reasoning scheme for geochemical data mining and automatic anomaly identification and classification, Wanwu Guo

Link

A Sufficient Criterion for Reliability Analysis on Statistical Results of Vector Datasets, Wanwu Guo

Data Mining Alogrithm for Rock Magnetic Data Analysis, Wanwu Guo

Link

Phytochemical changes in leaves of subtropical grasses and fynbos shrubs at elevated atmospheric CO2 concentrations, Dawood Hattas, William Stock, Wilfred Mabusela, and Ivan Green

Link

Cluster roots of Leucadendron laureolum (Proteaceae) and Lupinus albus (Fabaceae) take up glycine intact: An adaptive strategy to low mineral nitrogen in soils?, Heidi-Jayne Hawkins, Gabrielle Wolf, and William Stock

Link

Exploring Student's Abilities to Use Two Different Styles of Structural Representation in Organic Chemistry, Janette Head, Robert Bucat, Mauro Mocerino, and David Treagust

Link

Using games and simulation to teach AI, Philip Hingston and Barbara Coombes

PDF

Enumerating Knight's Tours using an Ant Colony Algorithm, Philip Hingston and Graham Kendall

Link

Potential health impacts associated with peat smoke: a review, Andrea Hinwood and Clemencia Rodriguez

PDF

Identity synthesis: Creating an identity from scratch, Lennon Hopkins

Link

Fire and wetland soils and sediments on the Swan Coastal Plain: An introduction, Pierre Horwitz and Ralph Douglas Smith

Link

Water quality responses to fire, with particular reference to organic-rich wetlands and the Swan Coastal Plain: A review, Pierre Horwitz and Beate Sommer

Link

Parasites, ecosystems and sustainability: An ecological and complex systems perspective, Pierre Horwitz and Bruce Wilcox

PDF

Designing Comminution Circuits with a Multi-Objective Evolutionary Algorithm, Simon Huband, Luigi Barone, Philip Hingston, Lyndon While, David Tuppurainen, and Richard Bearman

Link

A scalable multi-objective test problem toolkit, Simon Huband, Luigi Barone, Lyndon While, and Philip Hingston

An Information Centric approach to Information Security Teaching, William Hutchinson

PDF

Information security: A misnomer, William Hutchinson

Link

The 'Flexibility' of Official Information during Contemporary Conflict, William Hutchinson

The Relationship between Western Governments, Military and the Media during conflicts since 1980, William Hutchinson

Link

The 'Will' and information operations, William E. Hutchinson

Link

Does transported seagrass provide an important trophic link in unvegetated, nearshore areas?, Glenn Hyndes and Paul Lavery

Link

Secure deletion and the effectiveness of evidence elimination software, Simon Innes

Link

Turning a linksys WRT54G into more than just a wireless router, Simon Innes

PDF

Analysis of channel estimation error of OFDM systems in rayleigh fading, Bin Jiao, Jitian Xiao, and Jinlin Wang

PDF

Using process modelling to capture requirements for a digital library, Michael Johnstone

PDF

2D-barcode for mobile devices, Hiroko Kato

Link

Using human computer interaction principles to promote usable security, D Katsabas, S M. Furnell, and P S. Dowland

Link

Variations in the dietary compositions of morphologically diverse syngnathid fishes, Alan Kendrick and Glenn Hyndes

Link

A conceptual model as an aid to student understanding of network security, G Kohli, S P. Maj, G Murphy, and D Veal

PDF

An investigation into the use of B-Nodes and state models for computer network technology and education, Gurpreet Kohli

Link

The integration of state diagrams with competency-based assessment, G Kohli, D Veal, S P. Maj, and G Murphy

Link

A computer network laboratory based on the concept of virtual machines, Wojciech Kuczborski

Artifical Impostor Profiling for Keystroke Analysis on a Mobile Handset, Julien Lecomte, Nathan Clarke, and Steven Furnell

Link

Using Symbolic Execution to Guide Test Generation, Gareth Lee, John Morris, Kris Parker, Gary A. Bundell, and Chiou Peng Lam

Link

Using Anti-Ant-Like Agents to Generate Test Threads from the UML Diagrams, Huaizhong Li and Chiou Peng Lam

PDF

An Ant Colony Optimization Approach to Test Sequence Generation for State-Based Software Testing, Huaizhong Li and Chiou Peng Lam

Link

An Ecological Risk Assessment of Irrigation in the Ord River Catchment, a Highly Disturbed and Poorly Understood Area in the Wet-Dry Tropics of Australia, Mark Lund

PDF

Healthcare practitioners' perspectives on the use of e-health applications to support overweight and obese adolescents, Rachel J. Mahncke

Link

A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies, Stanislaw Maj, Gurpreet Kohli, and Tony Fetherston

Making Assignments More Authentic, Donald Mcdermid

Link

Herbicide contamination and the potential impact to seagrass meadows in Hervey Bay, Queensland, Australia, Kathryn McMahon, Susan Bengston-Nash, Geoff Eaglesham, Joachin Muller, and Norm Duke

PDF

Multinomial Representation of Majority Logic Coding, John B. Moore and Keng T. Tan

PDF

After Conversation - A Forensic ICQ Logfile Extraction Tool, Kim Morfitt and Craig Valli

Effects of Steganography In The Business World: How Mobile Devices Can Make A Difference, Danny Ng

One more blog, one more RSS feed - Liblogarians adventures in the bilioblogosphere, Hoi Ng

Link

A Quantitative Dietary Study of the 'Critically Endangered' Gilbert's Potoroo Potorous Gilbertii, Vinh Nguyen, Alan Needham, and Anthony Friend

PDF

Ten more years of educational technologies in education: How far have we travelled?, Ron Oliver

Link

Biomass dynamics of exotic Sargassum muticum and native Halidrys siliquosa in Limfjorden, Denmark - Implications of species replacements on turnover rates, Morten Pedersen, Peter Staehr, Thomas Wernberg, and Mads Solgaard Thomsen

Link

Skin Segmentation using Color Pixel Classification: Analysis and Comparison, Son Lam Phung, Abdesselam Bouzerdoum, and Douglas Chai

The ECU Advantage Project: Research Outcomes Advising the Future, Robyn Quin and Anthony Craig Watson

PDF

An investigation of network security management methods, Shamila Anuranga Ratnayake

Link

System Survivability: A Critical Security Problem, Jason Redman, Matthew Warren, and William Hutchinson

Link

Nowhere to hide: Awareness and perceptions of environmental change, and their influence on relationships with place, Ruth Rogan, Moira O'Connor, and Pierre Horwitz

Link

Using XML in Version Management of Chemical Process Models, Heidi Rose, Chiou Peng Lam, and Huaizhong Li

Link

HTTP-aware anonymisation of packet traces, Eric Salama, Bogdan Ghita, and Steven Furnell

Link

Recovery of Alpine Vegetation from Grazing and Drought: Data from Long-term Photoquadrats in Kosciuszko National Park, Australia, Pascal Scherrer and Catherine Marina Pickering

Link

The short-term effects of air pollution on hospital admissions in four Australian cities, Rod Simpson, Gail Williams, Anna Petroechevsky, Trudi Best, Geoff Morgan, Lynn Denison, Andrea Hinwood, and Gerard Neville

Link

The short-term effects of air pollution on daily mortality on four Australian cities, Rod Simpson, Gail Williams, Anna Petroechevsky, Trudi Best, Geoff Morgan, Lynn Denison, Andrea Hinwood, Gerard Neville, and Anne Neller

Link

Carbon and nitrogen stable isotope analysis of an Amphibolis griffithii seagrass bed, A J Smit, Ann Brearley, Glenn Hyndes, Paul Lavery, and Dianne Walker

Link

Preventing wetland soils and sediments from burning on the Swan Coastal Plain: Workshop outcomes and conclusions, Ralph D. Smith and Pierre Horwitz

Link

Long-term effects of elevated atmospheric CO2 on species composition and productivity of a southern African C4 dominated grassland in the vicinity of a CO2 exhalation, William Stock, Fulco Ludwig, Carl Morrow, Guy Midgley, Stephanie Wand, Nicky Allsopp, and Tina Bell

Link

Temporal changes between ecological regimes in a range of primary and secondary salinised wetlands, Karen Strehlow, Jennifer Davis, Lien Sim, Jane Chambers, Stuart Halse, David Hamilton, Pierre Horwitz, Arthur McComb, and Raymond Froend

Link

Enterprise architechture - bridge the gap between business, IT and universities, Anuradha Sutharshan, Stanislaw Maj, and David Veal

Link

Individuals perceptions of wireless security in the home environment, Patryk Szewczyk

Link

Securing PDAs in the healthcare environment, Emiko Terado and Patricia Williams

Link

Miniview: What effects the forces required to break or dislodge macroalgae?, Mads Solgaard Thomsen and Thomas Wernberg

PDF

Honeypot Technologies and Their Applicability as an Internal Countermeasure, Craig Valli

PDF

Integrating Open Source Protections into SCADA Networks, Craig Valli

PDF

Issues relating to the Forensic Analysis of PDA and Telephony (PDAT) Enabled Devices, Craig Valli

PDF

A UK and Australian Study of Hard Disk Disposal, Craig Valli and Andrew Jones

PDF

An Investigation into the Efficiency of Forensic Erasure Tools for Hard Disk Mechanisms, Craig Valli and Paul Patak

PDF

An Investigation into Long Range Detection of Passive UHF RFID Tags, Craig Valli, Andrew Woodward, Ken Wild, and Reino Karvinen

Link

Contrasting influence of sea urchins on attached and drift macroalgae, Mathew Vanderklift and Gary Kendrick

Link

Cisco Based Curricula in University Units, David Veal, Gurpreet Kohli, and Stanislaw Maj

Link

A New Visual Communication System for Deaf-Blind Tertiary Education Students, David Veal and Stanislaw Maj

Link

A framework for a bandwidth based network performance model for CS students, D Veal, G Kohli, S P. Maj, and J Cooper

Link

Beyond disciplinary boundaries: Leptospirosis as a model of incorporating transdisciplinary approaches to understand infectious disease emergence, Joe Vinetz, Bruce Wilcox, Alonso Aguirre, Lisa X. Gollin, Alan R. Katz, Roger S. Fujioka, Kepa Maly, Pierre Horwitz, and Healani Chang

Link

The Determination of the Best Separation Conditions for a Mixture of Preservatives of Varying Polarity Using HPLC: an ACELL Experiment, Magdalena Wajrak and Mary Boyce

PDF

A Bipartite Graph Approach to Generate Optimal Test Sequences for Protocol Conformance Testing using the Wp-method, Jun Wang, Jitian Xiao, Chiou Peng Lam, and Huaizhong Li

A Systems Approach to Security, Matthew Warren and William Hutchinson

A conceptual Model Security for IT Security Outsourcing, Matthew Warren, David Wilde, Sneza Dojkovski, and William Hutchinson

PDF

Diversity in information and communication technologies: The cost of lost opportunities, Susan Gail Webb

Link

Holdfast aggregation in relation to morphology, age, attachment and drag for the kelp Ecklonia radiata, Thomas Wernberg

Link

Modification of the physical environment by an Ecklonia radiata (Laminariales) canopy and implications for associated foliose algae, Thomas Wernberg, Gary Kendrick, and Ben Toohey

Link

The effect of wave exposure on the morphology of Ecklonia radiata, Thomas Wernberg and Mads Thomsen

PDF

Heuristics for Optimising the Calculation of Hypervolume for Multi-objective Optimisation Problems, Lyndon While, Lucas Bradstreet, Luigi Barone, and Philip Hingston

Link

Awareness invoking positive change: Reflections on lecturing practice in Computer and Information Science, Patricia Williams

Link

Information security awareness of medical practitioners, Patricia Williams

PDF

Physician secure thyself, Patricia Williams

PDF

The underestimation of threats to patients data in clinical practice, Patricia Williams

Link

Where are the policies for PDA usage in the Australian healthcare environment?, Patricia A. H. Williams

Link

Using online courseware for information literacy skills development in a multinational program, Patricia Williams and Julie Johnson

A new breed of risk: Electronic medical records security, Patricia Williams and Rachel Mahncke

Investigating student interaction: A forum analysis, Patricia Williams and Rachel Mahncke

Link

The blurring of on-campus and off-campus education: A position paper, Patricia Williams and Rachel Mahncke

Link

Elicitation and customisation of generic skills in a security major, Patricia Williams and Andrew Woodward

Under Pressure: Does Osmotic Potential of the Culture Medium Affect Growth of Seagrasses?, Julia Wilson and Ian Bennett

Link

Information Gathering using Google, Lih Wern Wong

PDF

Potential Bluetooth vulnerabilities in smartphones, Lih Wern Wong

PDF

Using in-depth interviewing to evaluate deep learning in students who use online curriculum: a literature review, Maria Woodhouse