Follow

Submissions from 2002

A Dynamic Communication Algorithm for Digital Halftoning, Philip Hingston and Lyndon While

Designing Crushers with a Multi-Objective Evolutionary Algorithm, Philip Hingston, Ronald While, and Luigi Barone

Link

Located Toxicology: The Need for Alternative Methodologies to Address Toxicological Significance, Pierre Horwitz and Pam Nichols

Link

Challenges in Undergraduate Computer Security Education, Christopher Hu

Link

Concepts in information warfare, W Hutchinson

Link

From Information Security to Information Warfare: A paradigm shift, William Hutchinson

Network Theory - The Demise of Systems Thinking?, William Hutchinson

The User Abuse of Logic in Contemporary Western Perception Management, William Hutchinson

Link

Aggression on the networks: An Australian viewpoint, William Hutchinson and Matthew Warren

Australian Hackers: An Ethical Perspective, William Hutchinson and Matthew Warren

Information Superiority and the Role of an Organisation's Network, William Hutchinson and Matthew Warren

Security Risk Analysis in E-Commerce, William Hutchinson and Matthew Warren

Link

Will new laws be effective in reducing web sponsorship of terrorist groups, William Hutchinson and Matthew Warren

Link

Truth, lies, reality and deception: An issue for e-commerce, W Hutchinson and M Warren

Modelling E-business Security Requirements: Developer and Client Expectations, Michael Johnstone, Donald Mcdermid, and John Venable

Link

Shared Use of Diagrams in requirements Elicitation; roles, expectations and behaviours, Michael Johnstone, Donald Mcdermid, and John Venable

PDF

Use of the d15N signatures of different functional forms of macroalgae and filter-feeders to reveal temporal and spatial patterns in sewage distribution, Mahvesh Khan, Paul Lavery, and A J Smit

Creating Opportunities from Challenges in On-line Introductory Biology, Annette Koenders

Link

Myofibrillar Protein Composition of Muscle Fibres from Regenerating and Pristine Claws of the freshwater Crayfish, Cherax Destructor, Annette Koenders, Lisa Cutler, Jan West, M Klemm, and Donald Mykles

Link

The Effects of Moult-induced atrophy on Claw Muscle of the Yabby, Cherax Destructor, Annette Koenders, Tina Lamey, and Jan West

Link

Ubiquitin and actin expression in claw muscles of land crab, Gecarcinus lateralis, and american lobster, Homarus americanus: Differential expression of ubiquitin in two slow muscle fiber types during molt-induced atrophy, Annette Koenders, Xiaoli Yu, Ernest S. Change, and Donald L. Mykles

Decomposition of Logic Networks Based on Partition Products, Wojciech Kuczborski

FPGA Implementation of Complex Boolean Functions, Wojciech Kuczborski

Highly Deployable Wireless Networks, Wojciech Kuczborski

The Application of Field Programmable Gate Arrays in Engineering Education, Wojciech Kuczborski

Invasion of Indigenous Vegetation in South-West by Leptospemum Laevigatum (Myrtaceae), Anya Lam and Eddie Van Etten

PDF

A Comparison of Spatial and Temporal Patterns in Epiphytic Macroagal Assemlages of the Seagrasses Amphibolis and Posidonia Coriacea, Paul Lavery and Mathew Vanderklift

Performing Firearm Identification Ballistic Database Operation Based on an Intranet, Dongguang Li and Bin Jiao

Link

A Global Optimisation Technique for Optical Thin Film Design, Dongguang Li and Anthony Craig Watson

Link

Cleavage Luminescence from Silicon, Dongguang Li and Anthony Craig Watson

Link

Optical Thin Film Optimization Design Using Genetic Algorithms, Dongguang Li and Anthony Craig Watson

B-Nodes: A bridge between the business model, information model and infrastructure model, Stanislaw Maj and Gurpreet Kohli

Modeling Global IT Structures Using B-Nodes, Stanislaw Maj and Gurpreet Kohli

So What's in a Use Case?, Donald Mcdermid

Using Strategic Choice to Make IS Decisions Quickly, Donald Mcdermid

A Framework on Evaluating and Managing the Benefits of IT, Donald Mcdermid, Chien Lin, and Graham Pervan

Link

Diets and predictions of feeding rate of house mice and Lakeland Downs short-tailed mice inhabiting an arid-zone island in Western Australia, D Moro and S D Bradshaw

Comparison of Baits and Bait Stations for the Selective Control of Wild House Mice on Thevenard Island, Western Australia, Dorian Moro

Link

An analysis of public key cryptosystems, Yousef Mubarak Bani Hammad

Link

Myofibrillar protein isoform expression is correlated with synaptic efficacy in slow fibres of the claw and leg opener muscles of crayfish and lobster, Donald L. Mykles, Scott Medler, Annette Koenders, and Robin Cooper

The Use of Local Systemic Action (LSA) to Develop Conceptual Models and to Solve Problem of Space Science and Technology Management in Indonesia, Sudibyo Sastrohardjono and William Hutchinson

Link

Measurement and observations inside a PC, Geoffrey I. Swan, David Veal, and S Paul Maj

Link

An Examination of Non-Business Usage of the World Wide Web in Two Western Australian Organisations, Craig Valli

The Misuse of the Internet at Work, Craig Valli

The New Homeland Defense, Craig Valli

The Proxy Bakers Dirty Dozen - An Analysis of Abusive Users of a WWW Cache, Craig Valli

PDF

With Speed the Hacker Cometh, Craig Valli

PDF

If You go Down the Internet Today - Deceptive Honeypots, Craig Valli and Suen Yek

Link

Patterns in fish assemblages 25 years after major seagrass loss, M A. Vanderklift and C A. Jacoby

Link

Cyberspace ethics and information warfare, Matthew Warren and William Hutchinson

Link

Application of Modified Conjugate Directional Filtering in Image Processing, Anthony Craig Watson and Wanwu Guo

Swarming in Information Warfare, Leigh Watson

Link

Wireless Insecurity - Current Issues with Securing Wlan's Utilising 802.11b Technology, Susan Gail Webb

Link

A Rich Storehouse for the Relief of Man's Estate: Education for Knowledge Management, Victoria Wilson, Philip Hingston, and Mark Brogan

PDF

Firewall or Folly - An Initial Investigation into the Effectiveness of Personal Firewalls in Securing Personal Computers from Attack, Jeshua Yee

Correlation Studies of Seismic Noise at AIGO, Chunnong Zhao, David Coward, David G Blair, R Burston, A Serle, Vincent Cusack, and S Scott

Link

An Image Database for Firearms Identification Based on Images of Cartridge Case and Projectile, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Link

A Web-Based Image Database and its Image Processing, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Link

Digital Holography and its Application to Firearm Identification Recording, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Link

Image Pre-Processing for a Firearm Identification System, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Submissions from 2001

Security of telemedical systems for the royal flying doctor service, Colin Armstrong and Helen Armstrong

Link

The virtual campus. a teaching mechanism for security units via the web, Colin Armstrong and Helen Armstrong

Link

Reaching for the stars. A practical case study in securing computer facilities, Helen Armstrong

Link

Benchmarks - are they really useful?, A Boyanich and S P. Maj

Link

Determination of additives in food by capillary electrophoresis, Mary Boyce

Link

Spatial variation of the d13 C signature of Ruppia megacarpa (Mason) in coastal lagoons of south-western Australia and its implication for isotopic studies, Mary C. Boyce, Paul Lavery, Pamela Weatherill, and Pierre Horwitz

Link

A bounded or unbounded universe?: knowledge management in postgraduate LIS Education, Mark Brogan, Philip Hingston, and Victoria Wilson

A case for system dynamics, Craig William Caulfield and Stanislaw Maj

PDF

A case for systems thinking and system dynamics, Craig William Caulfield and Stanislaw P. Maj

Link

Web based image database system for ballistic firearm identification, T C. Chase and D G. Li

An intelligent hotel reservation system, Chaiyaporn Chirathamjaree

Potential security breaches and threats in a wireless computing environment, Chirathamjaree and Rajagopal Gururajan

On-Line education: A necessary evil?, Steven Cikara and Stanislaw Maj

Link

Is a Practical Computer Installation and Maintenance Unit Cost Effective, Steven Cikara, David Veal, Anthony Watson, and Stanislaw Maj

Expert system development with kappa-pc, Maurice Danaher

Facilitating learning in conceptual design, Maurice Danaher

Procedural terrain visualisation for internet-based games, Maurice Danaher

Dynamic terrain visualization for web-based games, Maurice Danaher and Warren Creemers

Real - time plant generation, Maurice Danaher and Warren Creemers

Link

Information warfare and cyberwarfare: More than just software tools, Jack Davey

Link

Teaching cyberwarfare tactics and strategy, Jack Davey, Colin Armstrong, and Helen Armstrong

Link

Too much material, too little time: the computer education curriculum dilema, Rick Duley, Stanislaw Maj, and Alastair Boyanich

Link

Teamwork and trust: universities, industry and the professional software engineer, Rick Duley, Stanislaw P. Maj, and David Veal

Link

Conforming curricula for software engineers: observations from the Australian experience, Rick Duley, David Veal, and Stanislaw Maj

Link

To pull in harness: industry and universities face educating the professional software engineer, Rick Duley, David Veal, and Stanislaw Maj

PDF

Educating professional software engineers: pathways and progress in the Australian experience, Rick Duley, David Veal, and Stanislaw P. Maj

A unifying classification for bandwidth management, Adalbert Engel and Stanislaw Maj

The effects of reducing bird predation on canopy arthropods of marri (Eucalyptus calophylla) saplings on the Swan Coastal Plain, Western Australia, N.C.P Evelegh, J.D. Majer, and H.F. Recher

Link

Why have birds in the woodlands of southern Australia declined?, Hugh A Ford, Geoffrey W. Barrett, Denis A. Saunders, and Harry F. Recher

Link

Conjugated Linear Feature Enhancement using Conjugate Directional Filtering, Wanwu Guo, Dongguang Li, and Anthony Watson

Link

Directional Filtering as a Multi-Purpose Tool in Image Processing, Wanwu Guo, Dongguang Li, and Anthony Craig Watson

Link

Linear Feature Enhancement Using Directional Filtering and Neural System, Wanwu Guo, Dongguang Li, and Anthony Craig Watson

Link

Application of Fuzzy Logic in Seismic Zonation, Wanwu Guo, Anthony Craig Watson, and Dongguang Li

Link

Identifying Crustal Structure in NE Tibet by Gravity Image Processing, Wanwu Guo, Anthony Watson, and Dongguang Li

Link

Censorship rules: the topology and data topography of Australian adult web sites, D Harte and Mark Brogan

A genetic algorithm for regular inference, Philip Hingston

PDF

Inference of regular languages using model simplicity, Philip Hingston

Link

Differential use of seagrass assemblages by a suite of odacid species, Glenn Hyndes and Lachlan D. MacArthur

Link

Using ontological ideas to facilitate the comparison of requirements elicitation methods, Michael Johnstone and Donald Mcdermid

The significance of wireless local networks for the university sector, Kuczborski and Donna Czekalowski