Follow

Submissions from 2003

Application of AI for Automation of Software Testing, Chiou Peng Lam, Michael C. Robey, and Huaizhong Li

Link

Lessons that non-scientists can teach us about the concept of energy: a human-centred approach, Monica Leggett

Link

An Evolutionary Approach for Optimisation of State-Based Test Suites for Software Systems, Huaizhong Li and Chiou Peng Lam

Promoting Confidence in Software Components: A UML Approach, Huaizhong Li, Chiou Peng Lam, and Xiaoqing Bai

Vendor-based network engineering: an evaluation, Stanislaw Maj

Link

Selecting components: A process for context-driven evaluation, Valerie Maxville, Chiou Peng Lam, and Jocelyn Armarego

PDF

Algorithmic composition in contrasting music styles, Tristan Mcauley and Philip Hingston

How to elaborate a use case, Donald McDermid

How to prioritize information systems selection decisions under time pressure, Donald McDermid

Link

Integrated business process management: Using state-based business rules to communicate between disparate stakeholders, Donald C. Mcdermid

Link

Food availability for the dibbler (Parantechinus apicalis) on Boullanger and Whitlock Islands, Western Australia, Susan Miller, Roberta Bencini, Harriet Mills, and Dorian Moro

Link

Pathogens of house mice on arid Boullanger Island and subantarctic Macquarie Island, Australia, D Moro, M A. Lawson, R P Hobbs, and A C A Thompson

Link

Translocation of captive-bred dibblers Parantechinus apicalis (Marsupialia: Dasyuridae) to Escape Island, Western Australia, Dorian Moro

Pathogen study of house mice on islands reveals insights into viral persistence in isolated populations, Dorian Moro and Malcolm Lawson

Link

Microsatellite primers for the Western Pebble-mound Mouse (Pseudomys chapmani) that show cross amplification for other species of Australian rodent, Dorian Moro and Peter Spencer

Link

Setting a Framework for Trusted Component Trading, John Morris, Chiou Peng Lam, Gary A. Bundell, Gareth Lee, and Kris Parker

Link

Recovery of the Threatened Chuditch (Dasyurus Geoffroll): A Case STudy, Keith Morris, Brent Johnson, Peter Orell, Glen Gaikhorst, Adrian Wayne, and Dorian Moro

PDF

The mediated data integration (MeDInt) : An approach to the integration of database and legacy systems, Suvimol Mukviboonchai

The design of an interactive multimedia based professional development tool for educators, James New and Shirley Bode

Review of generic no-take areas and conventional fishery closure systems and their application to the management of tropical fishery resources along north-western Australia, Stephen Newman, Glenn Hyndes, Jim Penn, Michael C Mackie, and Peter C Stephenson

PDF

Wedge Veg : Gradient Analysis of Impacts to Coastal Heath Vegetation at Wedge, Western Australia, Steven O'Dwyer

A suggested viable system model for space science and technology development in Indonesia, Sudibyo Sastrohardjono

Verifying Conceptual System Models for the Indonesian Micro Satellite Programme and the Truth (Systems Models Verification and the Truth), Sudibyo Sastrohardjono

Link

Intraspecific variation in the advertisement call of the Sunset Frog Spicospina flammocaerulea (Anura: Myobatrachidae): a frog with a limited geographic distribution, Michael J Smith, J Dale Roberts, Thomas J Hammond, and Robert Davis

Link

Heuristics for Image Retrieval Using Spatial Configurations, William F. Smyth, Chiou Peng Lam, Xin Chen, and Valerie Maxville

Implementing user centred partnership design: Change in attitude made a difference, Anuradha Sutharshan, Stanislaw Maj, and Gurpreet Kohli

Link

The Impact of User Participation on Success in E-Commerce Developments: A Project Managers Perspective, Julian Terry and Craig Standing

Link

The value of User Participation in E-Commerce Systems Development, Julian Terry and Craig Standing

Link

Surface activity of arid-adapted frogs, G G. Thompson, S A. Thompson, and J L Fraser

Link

Assessing biodiversity with species accumulation curves; inventories of small reptiles by pit-trapping in Western Australia, Graham G. Thompson, Philip Withers, Eric R Pianka, and Scott A. Thompson

Link

Dynamics of a cyanobacterial bloom in a hypereutrophic, stratified weir pool, Peter Thompson, Anya Waite, and Kathryn Mcmahon

Link

Reproductive observations of a Thorny Devil, Moloch orridus, in a semi-arid environment, Scott Thompson

Link

The western bearded dragon, Pogona minor (Squamata: Agamidae): An early lizard coloniser of rehabilitated areas, Scott Thompson and Graham Thompson

PDF

Honeyd - A OS Fingerprinting Artifice, Craig Valli

Industry Certification: Challenges for the conduct of University security based courses, Craig Valli

An Initial Investigation into the Performance of the Honeyd Virtual Honeypot System, Craig Valli and Nirbhay Gupta

Link

Sources of variation in consumer-diet δ15N enrichment: a meta-analysis, Mathew Vanderklift and Sergine Ponsard

Link

The image of Unanimity: The utility of the promotion and disparagement of cultural and social unanimity as a form of context manipulation in information warfare in the aftermath of the attacks of September 11, 2001, Andrew Walls

Link

A Security Risk Management Approach for e-Commerce, Matthew Warren and William Hutchinson

PDF

Australian Hackers and Ethics, Matthew Warren and William Hutchinson

Link

The Law and Cyber Terrorism, Matthew Warren and William Hutchinson

Link

Information security - An e-learning problem, M Warren and W Hutchinson

TOACS and eCourse2: From Thailand and Australia to the World but Where to Next?, Anthony Craig Watson

Identifying Trends in the Deployment and Security of 802.11B Wireless Technology in Perth, WA , Susan Webb

The Role of Wireless Network Technology in Network Centric Warface, Susan Webb

Link

Regional differences in kelp-associated algal assemblages on temperate limestone reefs in south-western Australia, Thomas Wernberg, Gary A. Kendrick, and Julia C. Phillips

Link

Differences in recreationally targeted fishes between protected and fished areas of a coral reef marine park, Mark Westera, Paul Lavery, and Glenn Hyndes

PDF

Isolation and characterisation of a pax group III gene from the freshwater crayfish cherax destructor: Implications for the evolution of muscle regeneration, Robert B. White

PDF

A Case Study in the Security of Network-Enabled Devices, Simeon Xenitellis and Craig Valli

An Efficient algorithm for scheduling spatial join operations in spatial databse systems, Jitian Xiao

Match Based SJP Cluster sequencing and scheduling in spatial databases, Jitian Xiao

A framework for the use of deception in Network Security, Suen Yek

Measuring the Effectiveness of deception in a wireless honeypot, Suen Yek

PDF

Variability in water use by phreatophytic Banksia woodland vegetation of the Swan Coastal Plain, Western Australia, Sandra Jane Zencich

Link

Digital Holography and its Applications, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Link

DSP - based Digital Control of Ultra-low Frequency Vibration Isolators, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Fully Digital Control of a Pre-Isolator for Gravitational Wave Detection, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson

Submissions from 2002

Link

Back to the Future: The Expanding Role of Strategic Communcations within the Bush Administration, Edwin Leigh Armistead

Link

Solid-phase microextraction in food analysis: With particular reference to wine, M C. Boyce and E E. Spickett

Link

A Security Evaluation Criteria, W J Brooks, M J. Warren, and W Hutchinson

Flexible Rules and Actions for Delivery of Online Courseware Learning Materials, Justin Brown

A Case for Games in Software Engineering, Craig William Caulfield and Stanislaw Maj

Link

An XML, DTD for Subject Related Resources, Robert Chandler and Karen Anderson

Link

A Model Architecture to Combat Security Issues in Mobile Commerce, Chaiyaporn Chirathamjaree and Rajagopal Gururajan

Link

Mobile Commerce: A Model to Address New Financial Transaction Security Concerns, Chaiyaporn Chirathamjaree and Rajagopal Gururajan

RISS-ECU InNovative Technologies for University Teaching, Chaiyaporn Chirathamjaree and Rajagopal Gururajan

A Mediated Data Model for Heterogeneous Data Integration, Chaiyaporn Chirathamjaree and Suvimol Mukviboonchai

PDF

The Mediated Integration Arcitecture for heterogeneous Data Integration, Chaiyaporn Chirathamjaree and Suvimol Mukviboonchai

An Investigation into the Community Information Database System in the Northeast of Thailand: Community Empowerment through Community Learning Centres, Chaiyaporn Chirathamjaree and C Wongchachom

PDF

Teachers, teams and technology: Investigating a team approach for supporting teachers' uptake of ICT, Barnard D. Clarkson

Link

Out in the wide world with a new 'piece of paper': a survey of graduates of Edith Cowan University's Batchelor of Science (Library Technology), Judith Clayden

Link

Voting in the New Millenium: eVoting Holds the Promise to Expand Citizen Choice, Vincent Cordonnier and Anthony Craig Watson

Dynamic Landscape Generation using Page Management, Maurice Danaher

An approach to real-time plant generation, Maurice Danaher and Warren Creemers

Object Segmentation Using Colour for Security Applications on Mobile Devices, Maurice Danaher and Lesley Hopkins

Creating a University Website with VRML, Maurice Danaher and Choon-Sig Lee

Mobile home security with GPRS [conference contribution], Maurice Danaher and D Nguyen

From Sword to Software: The Evolution of Weapons of Conflict, John Davey

Link

Dominating the attacker: Use of intelligence and counterintelligence in cyberwarfare, John Davey and Helen Armstrong

PDF

Cutting Hacking: Breaking from Tradition, Rick Duley and Stanislaw P. Maj

Link

Influence of Groundwater Depth on the Seasonal Sources of Water Accessed by Banksia Tree Species on a Shallow, Sandy Coastal Aquifer, Raymond Froend, Sandra Zencich, Jeffrey Turner, and Vit Gailitis

Link

Avifauna of Mount Tomah botanic gardens and Upper Stockyard Gully in the Blue Mountains, New South Wales, G. R. Fulton

Link

Pneumaticity of the dorsal foramen and dorsal sulcus of the sternum in Austalasian Passeriformes, Graham Russell Fulton and W E Boles

A Neural System for MCDF Operations: Design and Testing, Wanwu Guo and Anthony Watson

Link

A Neural System Design for CDF Operations, Wanwu Guo and Anthony Craig Watson

Link

Modification of Conjugate Directional Filtering: from CDF to MCDF, Wanwu Guo and Anthony Craig Watson

Link

Improving the Effectiveness of Deceptive Honeynets Through an Empirical Learning Approach, Nirbhay Gupta

Using Finite State Automata for Sequence Mining, Philip Hingston

PDF

Evolving Crushers, Philip Hingston, Luigi Barone, and Ronald While

A Dynamic Communication Algorithm for Digital Halftoning, Philip Hingston and Lyndon While

Designing Crushers with a Multi-Objective Evolutionary Algorithm, Philip Hingston, Ronald While, and Luigi Barone

Link

Located Toxicology: The Need for Alternative Methodologies to Address Toxicological Significance, Pierre Horwitz and Pam Nichols

Link

Challenges in Undergraduate Computer Security Education, Christopher Hu

Link

Concepts in information warfare, W Hutchinson

Link

From Information Security to Information Warfare: A paradigm shift, William Hutchinson

Network Theory - The Demise of Systems Thinking?, William Hutchinson

The User Abuse of Logic in Contemporary Western Perception Management, William Hutchinson

Link

Aggression on the networks: An Australian viewpoint, William Hutchinson and Matthew Warren

Australian Hackers: An Ethical Perspective, William Hutchinson and Matthew Warren

Information Superiority and the Role of an Organisation's Network, William Hutchinson and Matthew Warren