Submissions from 2003
Application of AI for Automation of Software Testing, Chiou Peng Lam, Michael C. Robey, and Huaizhong Li
Lessons that non-scientists can teach us about the concept of energy: a human-centred approach, Monica Leggett
An Evolutionary Approach for Optimisation of State-Based Test Suites for Software Systems, Huaizhong Li and Chiou Peng Lam
Promoting Confidence in Software Components: A UML Approach, Huaizhong Li, Chiou Peng Lam, and Xiaoqing Bai
Vendor-based network engineering: an evaluation, Stanislaw Maj
Selecting components: A process for context-driven evaluation, Valerie Maxville, Chiou Peng Lam, and Jocelyn Armarego
Algorithmic composition in contrasting music styles, Tristan Mcauley and Philip Hingston
How to elaborate a use case, Donald McDermid
How to prioritize information systems selection decisions under time pressure, Donald McDermid
Integrated business process management: Using state-based business rules to communicate between disparate stakeholders, Donald C. Mcdermid
Food availability for the dibbler (Parantechinus apicalis) on Boullanger and Whitlock Islands, Western Australia, Susan Miller, Roberta Bencini, Harriet Mills, and Dorian Moro
Pathogens of house mice on arid Boullanger Island and subantarctic Macquarie Island, Australia, D Moro, M A. Lawson, R P Hobbs, and A C A Thompson
Pathogen study of house mice on islands reveals insights into viral persistence in isolated populations, Dorian Moro and Malcolm Lawson
Microsatellite primers for the Western Pebble-mound Mouse (Pseudomys chapmani) that show cross amplification for other species of Australian rodent, Dorian Moro and Peter Spencer
Setting a Framework for Trusted Component Trading, John Morris, Chiou Peng Lam, Gary A. Bundell, Gareth Lee, and Kris Parker
Recovery of the Threatened Chuditch (Dasyurus Geoffroll): A Case STudy, Keith Morris, Brent Johnson, Peter Orell, Glen Gaikhorst, Adrian Wayne, and Dorian Moro
The mediated data integration (MeDInt) : An approach to the integration of database and legacy systems, Suvimol Mukviboonchai
The design of an interactive multimedia based professional development tool for educators, James New and Shirley Bode
Review of generic no-take areas and conventional fishery closure systems and their application to the management of tropical fishery resources along north-western Australia, Stephen Newman, Glenn Hyndes, Jim Penn, Michael C Mackie, and Peter C Stephenson
Wedge Veg : Gradient Analysis of Impacts to Coastal Heath Vegetation at Wedge, Western Australia, Steven O'Dwyer
A suggested viable system model for space science and technology development in Indonesia, Sudibyo Sastrohardjono
Verifying Conceptual System Models for the Indonesian Micro Satellite Programme and the Truth (Systems Models Verification and the Truth), Sudibyo Sastrohardjono
Intraspecific variation in the advertisement call of the Sunset Frog Spicospina flammocaerulea (Anura: Myobatrachidae): a frog with a limited geographic distribution, Michael J Smith, J Dale Roberts, Thomas J Hammond, and Robert Davis
Heuristics for Image Retrieval Using Spatial Configurations, William F. Smyth, Chiou Peng Lam, Xin Chen, and Valerie Maxville
Implementing user centred partnership design: Change in attitude made a difference, Anuradha Sutharshan, Stanislaw Maj, and Gurpreet Kohli
The Impact of User Participation on Success in E-Commerce Developments: A Project Managers Perspective, Julian Terry and Craig Standing
The value of User Participation in E-Commerce Systems Development, Julian Terry and Craig Standing
Surface activity of arid-adapted frogs, G G. Thompson, S A. Thompson, and J L Fraser
Assessing biodiversity with species accumulation curves; inventories of small reptiles by pit-trapping in Western Australia, Graham G. Thompson, Philip Withers, Eric R Pianka, and Scott A. Thompson
Dynamics of a cyanobacterial bloom in a hypereutrophic, stratified weir pool, Peter Thompson, Anya Waite, and Kathryn Mcmahon
Reproductive observations of a Thorny Devil, Moloch orridus, in a semi-arid environment, Scott Thompson
The western bearded dragon, Pogona minor (Squamata: Agamidae): An early lizard coloniser of rehabilitated areas, Scott Thompson and Graham Thompson
Honeyd - A OS Fingerprinting Artifice, Craig Valli
Industry Certification: Challenges for the conduct of University security based courses, Craig Valli
An Initial Investigation into the Performance of the Honeyd Virtual Honeypot System, Craig Valli and Nirbhay Gupta
Sources of variation in consumer-diet δ15N enrichment: a meta-analysis, Mathew Vanderklift and Sergine Ponsard
A Security Risk Management Approach for e-Commerce, Matthew Warren and William Hutchinson
Australian Hackers and Ethics, Matthew Warren and William Hutchinson
The Law and Cyber Terrorism, Matthew Warren and William Hutchinson
Information security - An e-learning problem, M Warren and W Hutchinson
TOACS and eCourse2: From Thailand and Australia to the World but Where to Next?, Anthony Craig Watson
Identifying Trends in the Deployment and Security of 802.11B Wireless Technology in Perth, WA , Susan Webb
The Role of Wireless Network Technology in Network Centric Warface, Susan Webb
Regional differences in kelp-associated algal assemblages on temperate limestone reefs in south-western Australia, Thomas Wernberg, Gary A. Kendrick, and Julia C. Phillips
Differences in recreationally targeted fishes between protected and fished areas of a coral reef marine park, Mark Westera, Paul Lavery, and Glenn Hyndes
A Case Study in the Security of Network-Enabled Devices, Simeon Xenitellis and Craig Valli
An Efficient algorithm for scheduling spatial join operations in spatial databse systems, Jitian Xiao
Match Based SJP Cluster sequencing and scheduling in spatial databases, Jitian Xiao
A framework for the use of deception in Network Security, Suen Yek
Measuring the Effectiveness of deception in a wireless honeypot, Suen Yek
Variability in water use by phreatophytic Banksia woodland vegetation of the Swan Coastal Plain, Western Australia, Sandra Jane Zencich
Digital Holography and its Applications, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
DSP - based Digital Control of Ultra-low Frequency Vibration Isolators, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
Fully Digital Control of a Pre-Isolator for Gravitational Wave Detection, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
Submissions from 2002
Back to the Future: The Expanding Role of Strategic Communcations within the Bush Administration, Edwin Leigh Armistead
Solid-phase microextraction in food analysis: With particular reference to wine, M C. Boyce and E E. Spickett
A Security Evaluation Criteria, W J Brooks, M J. Warren, and W Hutchinson
Flexible Rules and Actions for Delivery of Online Courseware Learning Materials, Justin Brown
A Case for Games in Software Engineering, Craig William Caulfield and Stanislaw Maj
An XML, DTD for Subject Related Resources, Robert Chandler and Karen Anderson
A Model Architecture to Combat Security Issues in Mobile Commerce, Chaiyaporn Chirathamjaree and Rajagopal Gururajan
Mobile Commerce: A Model to Address New Financial Transaction Security Concerns, Chaiyaporn Chirathamjaree and Rajagopal Gururajan
RISS-ECU InNovative Technologies for University Teaching, Chaiyaporn Chirathamjaree and Rajagopal Gururajan
A Mediated Data Model for Heterogeneous Data Integration, Chaiyaporn Chirathamjaree and Suvimol Mukviboonchai
The Mediated Integration Arcitecture for heterogeneous Data Integration, Chaiyaporn Chirathamjaree and Suvimol Mukviboonchai
An Investigation into the Community Information Database System in the Northeast of Thailand: Community Empowerment through Community Learning Centres, Chaiyaporn Chirathamjaree and C Wongchachom
Teachers, teams and technology: Investigating a team approach for supporting teachers' uptake of ICT, Barnard D. Clarkson
Out in the wide world with a new 'piece of paper': a survey of graduates of Edith Cowan University's Batchelor of Science (Library Technology), Judith Clayden
Voting in the New Millenium: eVoting Holds the Promise to Expand Citizen Choice, Vincent Cordonnier and Anthony Craig Watson
Dynamic Landscape Generation using Page Management, Maurice Danaher
An approach to real-time plant generation, Maurice Danaher and Warren Creemers
Object Segmentation Using Colour for Security Applications on Mobile Devices, Maurice Danaher and Lesley Hopkins
Creating a University Website with VRML, Maurice Danaher and Choon-Sig Lee
Mobile home security with GPRS [conference contribution], Maurice Danaher and D Nguyen
From Sword to Software: The Evolution of Weapons of Conflict, John Davey
Dominating the attacker: Use of intelligence and counterintelligence in cyberwarfare, John Davey and Helen Armstrong
Cutting Hacking: Breaking from Tradition, Rick Duley and Stanislaw P. Maj
Influence of Groundwater Depth on the Seasonal Sources of Water Accessed by Banksia Tree Species on a Shallow, Sandy Coastal Aquifer, Raymond Froend, Sandra Zencich, Jeffrey Turner, and Vit Gailitis
Avifauna of Mount Tomah botanic gardens and Upper Stockyard Gully in the Blue Mountains, New South Wales, G. R. Fulton
Pneumaticity of the dorsal foramen and dorsal sulcus of the sternum in Austalasian Passeriformes, Graham Russell Fulton and W E Boles
A Neural System for MCDF Operations: Design and Testing, Wanwu Guo and Anthony Watson
A Neural System Design for CDF Operations, Wanwu Guo and Anthony Craig Watson
Modification of Conjugate Directional Filtering: from CDF to MCDF, Wanwu Guo and Anthony Craig Watson
Improving the Effectiveness of Deceptive Honeynets Through an Empirical Learning Approach, Nirbhay Gupta
Using Finite State Automata for Sequence Mining, Philip Hingston
Evolving Crushers, Philip Hingston, Luigi Barone, and Ronald While
A Dynamic Communication Algorithm for Digital Halftoning, Philip Hingston and Lyndon While
Designing Crushers with a Multi-Objective Evolutionary Algorithm, Philip Hingston, Ronald While, and Luigi Barone
Located Toxicology: The Need for Alternative Methodologies to Address Toxicological Significance, Pierre Horwitz and Pam Nichols
Challenges in Undergraduate Computer Security Education, Christopher Hu
Concepts in information warfare, W Hutchinson
From Information Security to Information Warfare: A paradigm shift, William Hutchinson
Network Theory - The Demise of Systems Thinking?, William Hutchinson
The User Abuse of Logic in Contemporary Western Perception Management, William Hutchinson
Aggression on the networks: An Australian viewpoint, William Hutchinson and Matthew Warren
Australian Hackers: An Ethical Perspective, William Hutchinson and Matthew Warren
Information Superiority and the Role of an Organisation's Network, William Hutchinson and Matthew Warren