Submissions from 2003
Functional capacities of marsupial hearts: size and mitochondrial parameters indicate higher aerobic capabilities than generally seen in placental mammals, T J Dawson, K N Webster, B Mifsud, E Raad, E Lee, and A D. Needham
Simulation of bulk absorption thermal lensing in transmissive optics of gravitational waves detectors, Jerome Degallaix, Chunnong Zhao, L Ju, and David G Blair
Vendor based network engineering education: An international comparison, Jambukeswaran Dharukeshwari and Stanislaw Maj
Quail eggs, modelling clay eggs, imprints and small mammals in Australian woodland, Graham Fulton and Hugh A Ford
Black swan and western tiger snake: A conflict avoidance encounter, Graham Fulton and Mercedes Smith
Application of nonlinear analysis in magnetic experimental data processing, Wanwu Guo
A principle-tactics based approach for guiding student project management, Wanwu Guo
Evaluation of Web-based knowledge delivery systems using T-PUMA model, Wanwu Guo and James Millar
A Neural System Prototype for Data Processing Using Modified Conjugate Directional Filtering (MCDF), Wanwu Guo and Anthony Craig Watson
Image Pattern Recognition Using Modified Conjugate Directional Filtering (MCDF), Wanwu Guo and Anthony Craig Watson
Medical Image Processing Using Modified Conjugate Directional Filtering, Wanwu Guo and Anthony Craig Watson
Determining the effectiveness of deceptive honeynets, Nirbhay Gupta
An Intervention Trial on Short Term Exposure to Inorganic Arsenic in Drinking Water, Andrea Hinwood, Nick de Klerk, Malcolm Sim, Judy Hankin, and Jim Gerostamoulos
Risk factors for increased urinary inorganic arsenic concentrations from low arsenic concentrations in drinking water, Andrea Hinwood, Malcolm R Sim, Damien Jolley, Nick de Klerk, Elisa Bastone, Jim Gerostamoulos, and Olaf O Drummer
Fire and organic substrates: soil structure, water quality and biodiversity in far southwest Western Australia, Pierre Horwitz, Simon Judd, and Beate Sommer
Socio-ecological relationships and their consequences in coping with environmental changes in south-western Australia, Pierre Horwitz, Ruth Rogan, Keith Bradby, and Margaret Robertson
Security management education online, Peter J. Hosie, Clifton L. Smith, and Joseph Luca
Integrating information security and intelligence courses, W Hutchinson
Modern Asymmetric Warfare and the Failure of the West, William Hutchinson
The Changing Nature of Information Security, William Hutchinson
The Impact of Groupthink on the Intelligence Function, William Hutchinson
Emergence: The Achilles Heel of Systems Thinking, William Hutchinson and Matthew Warren
Differences in the species- and size-composition of fish assemblages in three distinct seagrass habitats with differing plant and meadow structure, Glenn Hyndes, Alan Kendrick, Lachlan D MacArthur, and Emily Stewart
Extending the business rules diagram method to web based system design, Michael Johnstone, Donald Mcdermid, and John Venable
Patterns in the abundance and size-distribution of syngnathid fishes among habitats in a seagrass-dominated marine environment, A J Kendrick and G A. Hyndes
Modelling Website Infrastructure using B-Node Theory, Gurpreet Kohli, David Veal, and Stanislaw Maj
A Firearm Identification System Based on Neural Network, Jun Kong, Dongguang Li, and Anthony Craig Watson
A new minor in network administration and design, Wojciech Kuczborski
High-Radix Arithmetic Systems on Signed Digit Number Representation and Residue Number System, Wojciech Kuczborski
The significance of virtual computer networks in distance education, Wojciech Kuczborski
Clutch hydration following ovipositions by urination may reduce dessication in thorny devil (Moloch horridus) eggs, Mitchell Ladyman and Scott Thompson
Intelligent Test Data Processing for State-Based Software Testing, Chiou Peng Lam and Huaizhong Li
Application of AI for Automation of Software Testing, Chiou Peng Lam, Michael C. Robey, and Huaizhong Li
Lessons that non-scientists can teach us about the concept of energy: a human-centred approach, Monica Leggett
An Evolutionary Approach for Optimisation of State-Based Test Suites for Software Systems, Huaizhong Li and Chiou Peng Lam
Promoting Confidence in Software Components: A UML Approach, Huaizhong Li, Chiou Peng Lam, and Xiaoqing Bai
Vendor-based network engineering: an evaluation, Stanislaw Maj
Selecting components: A process for context-driven evaluation, Valerie Maxville, Chiou Peng Lam, and Jocelyn Armarego
Algorithmic composition in contrasting music styles, Tristan Mcauley and Philip Hingston
How to elaborate a use case, Donald McDermid
How to prioritize information systems selection decisions under time pressure, Donald McDermid
Integrated business process management: Using state-based business rules to communicate between disparate stakeholders, Donald C. Mcdermid
Food availability for the dibbler (Parantechinus apicalis) on Boullanger and Whitlock Islands, Western Australia, Susan Miller, Roberta Bencini, Harriet Mills, and Dorian Moro
Pathogens of house mice on arid Boullanger Island and subantarctic Macquarie Island, Australia, D Moro, M A. Lawson, R P Hobbs, and A C A Thompson
Pathogen study of house mice on islands reveals insights into viral persistence in isolated populations, Dorian Moro and Malcolm Lawson
Microsatellite primers for the Western Pebble-mound Mouse (Pseudomys chapmani) that show cross amplification for other species of Australian rodent, Dorian Moro and Peter Spencer
Setting a Framework for Trusted Component Trading, John Morris, Chiou Peng Lam, Gary A. Bundell, Gareth Lee, and Kris Parker
Recovery of the Threatened Chuditch (Dasyurus Geoffroll): A Case STudy, Keith Morris, Brent Johnson, Peter Orell, Glen Gaikhorst, Adrian Wayne, and Dorian Moro
The mediated data integration (MeDInt) : An approach to the integration of database and legacy systems, Suvimol Mukviboonchai
The design of an interactive multimedia based professional development tool for educators, James New and Shirley Bode
Review of generic no-take areas and conventional fishery closure systems and their application to the management of tropical fishery resources along north-western Australia, Stephen Newman, Glenn Hyndes, Jim Penn, Michael C Mackie, and Peter C Stephenson
Wedge Veg : Gradient Analysis of Impacts to Coastal Heath Vegetation at Wedge, Western Australia, Steven O'Dwyer
A suggested viable system model for space science and technology development in Indonesia, Sudibyo Sastrohardjono
Verifying Conceptual System Models for the Indonesian Micro Satellite Programme and the Truth (Systems Models Verification and the Truth), Sudibyo Sastrohardjono
Intraspecific variation in the advertisement call of the Sunset Frog Spicospina flammocaerulea (Anura: Myobatrachidae): a frog with a limited geographic distribution, Michael J Smith, J Dale Roberts, Thomas J Hammond, and Robert Davis
Heuristics for Image Retrieval Using Spatial Configurations, William F. Smyth, Chiou Peng Lam, Xin Chen, and Valerie Maxville
Implementing user centred partnership design: Change in attitude made a difference, Anuradha Sutharshan, Stanislaw Maj, and Gurpreet Kohli
The Impact of User Participation on Success in E-Commerce Developments: A Project Managers Perspective, Julian Terry and Craig Standing
The value of User Participation in E-Commerce Systems Development, Julian Terry and Craig Standing
Surface activity of arid-adapted frogs, G G. Thompson, S A. Thompson, and J L Fraser
Assessing biodiversity with species accumulation curves; inventories of small reptiles by pit-trapping in Western Australia, Graham G. Thompson, Philip Withers, Eric R Pianka, and Scott A. Thompson
Dynamics of a cyanobacterial bloom in a hypereutrophic, stratified weir pool, Peter Thompson, Anya Waite, and Kathryn Mcmahon
Reproductive observations of a Thorny Devil, Moloch orridus, in a semi-arid environment, Scott Thompson
The western bearded dragon, Pogona minor (Squamata: Agamidae): An early lizard coloniser of rehabilitated areas, Scott Thompson and Graham Thompson
Honeyd - A OS Fingerprinting Artifice, Craig Valli
Industry Certification: Challenges for the conduct of University security based courses, Craig Valli
An Initial Investigation into the Performance of the Honeyd Virtual Honeypot System, Craig Valli and Nirbhay Gupta
Sources of variation in consumer-diet δ15N enrichment: a meta-analysis, Mathew Vanderklift and Sergine Ponsard
A Security Risk Management Approach for e-Commerce, Matthew Warren and William Hutchinson
Australian Hackers and Ethics, Matthew Warren and William Hutchinson
The Law and Cyber Terrorism, Matthew Warren and William Hutchinson
Information security - An e-learning problem, M Warren and W Hutchinson
TOACS and eCourse2: From Thailand and Australia to the World but Where to Next?, Anthony Craig Watson
Identifying Trends in the Deployment and Security of 802.11B Wireless Technology in Perth, WA , Susan Webb
The Role of Wireless Network Technology in Network Centric Warface, Susan Webb
Regional differences in kelp-associated algal assemblages on temperate limestone reefs in south-western Australia, Thomas Wernberg, Gary A. Kendrick, and Julia C. Phillips
Differences in recreationally targeted fishes between protected and fished areas of a coral reef marine park, Mark Westera, Paul Lavery, and Glenn Hyndes
A Case Study in the Security of Network-Enabled Devices, Simeon Xenitellis and Craig Valli
An Efficient algorithm for scheduling spatial join operations in spatial databse systems, Jitian Xiao
Match Based SJP Cluster sequencing and scheduling in spatial databases, Jitian Xiao
A framework for the use of deception in Network Security, Suen Yek
Measuring the Effectiveness of deception in a wireless honeypot, Suen Yek
Variability in water use by phreatophytic Banksia woodland vegetation of the Swan Coastal Plain, Western Australia, Sandra Jane Zencich
Digital Holography and its Applications, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
DSP - based Digital Control of Ultra-low Frequency Vibration Isolators, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
Fully Digital Control of a Pre-Isolator for Gravitational Wave Detection, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
Submissions from 2002
Back to the Future: The Expanding Role of Strategic Communcations within the Bush Administration, Edwin Leigh Armistead
Solid-phase microextraction in food analysis: With particular reference to wine, M C. Boyce and E E. Spickett
A Security Evaluation Criteria, W J Brooks, M J. Warren, and W Hutchinson
Flexible Rules and Actions for Delivery of Online Courseware Learning Materials, Justin Brown
A Case for Games in Software Engineering, Craig William Caulfield and Stanislaw Maj
An XML, DTD for Subject Related Resources, Robert Chandler and Karen Anderson
A Model Architecture to Combat Security Issues in Mobile Commerce, Chaiyaporn Chirathamjaree and Rajagopal Gururajan
Mobile Commerce: A Model to Address New Financial Transaction Security Concerns, Chaiyaporn Chirathamjaree and Rajagopal Gururajan
RISS-ECU InNovative Technologies for University Teaching, Chaiyaporn Chirathamjaree and Rajagopal Gururajan
A Mediated Data Model for Heterogeneous Data Integration, Chaiyaporn Chirathamjaree and Suvimol Mukviboonchai
The Mediated Integration Arcitecture for heterogeneous Data Integration, Chaiyaporn Chirathamjaree and Suvimol Mukviboonchai