Submissions from 2002
Security Risk Analysis in E-Commerce, William Hutchinson and Matthew Warren
Will new laws be effective in reducing web sponsorship of terrorist groups, William Hutchinson and Matthew Warren
Truth, lies, reality and deception: An issue for e-commerce, W Hutchinson and M Warren
Modelling E-business Security Requirements: Developer and Client Expectations, Michael Johnstone, Donald Mcdermid, and John Venable
Shared Use of Diagrams in requirements Elicitation; roles, expectations and behaviours, Michael Johnstone, Donald Mcdermid, and John Venable
Use of the d15N signatures of different functional forms of macroalgae and filter-feeders to reveal temporal and spatial patterns in sewage distribution, Mahvesh Khan, Paul Lavery, and A J Smit
Creating Opportunities from Challenges in On-line Introductory Biology, Annette Koenders
Myofibrillar Protein Composition of Muscle Fibres from Regenerating and Pristine Claws of the freshwater Crayfish, Cherax Destructor, Annette Koenders, Lisa Cutler, Jan West, M Klemm, and Donald Mykles
The Effects of Moult-induced atrophy on Claw Muscle of the Yabby, Cherax Destructor, Annette Koenders, Tina Lamey, and Jan West
Ubiquitin and actin expression in claw muscles of land crab, Gecarcinus lateralis, and american lobster, Homarus americanus: Differential expression of ubiquitin in two slow muscle fiber types during molt-induced atrophy, Annette Koenders, Xiaoli Yu, Ernest S. Change, and Donald L. Mykles
Decomposition of Logic Networks Based on Partition Products, Wojciech Kuczborski
FPGA Implementation of Complex Boolean Functions, Wojciech Kuczborski
Highly Deployable Wireless Networks, Wojciech Kuczborski
The Application of Field Programmable Gate Arrays in Engineering Education, Wojciech Kuczborski
Invasion of Indigenous Vegetation in South-West by Leptospemum Laevigatum (Myrtaceae), Anya Lam and Eddie Van Etten
A Comparison of Spatial and Temporal Patterns in Epiphytic Macroagal Assemlages of the Seagrasses Amphibolis and Posidonia Coriacea, Paul Lavery and Mathew Vanderklift
Performing Firearm Identification Ballistic Database Operation Based on an Intranet, Dongguang Li and Bin Jiao
A Global Optimisation Technique for Optical Thin Film Design, Dongguang Li and Anthony Craig Watson
Cleavage Luminescence from Silicon, Dongguang Li and Anthony Craig Watson
Optical Thin Film Optimization Design Using Genetic Algorithms, Dongguang Li and Anthony Craig Watson
B-Nodes: A bridge between the business model, information model and infrastructure model, Stanislaw Maj and Gurpreet Kohli
Modeling Global IT Structures Using B-Nodes, Stanislaw Maj and Gurpreet Kohli
So What's in a Use Case?, Donald Mcdermid
Using Strategic Choice to Make IS Decisions Quickly, Donald Mcdermid
A Framework on Evaluating and Managing the Benefits of IT, Donald Mcdermid, Chien Lin, and Graham Pervan
Diets and predictions of feeding rate of house mice and Lakeland Downs short-tailed mice inhabiting an arid-zone island in Western Australia, D Moro and S D Bradshaw
An analysis of public key cryptosystems, Yousef Mubarak Bani Hammad
Myofibrillar protein isoform expression is correlated with synaptic efficacy in slow fibres of the claw and leg opener muscles of crayfish and lobster, Donald L. Mykles, Scott Medler, Annette Koenders, and Robin Cooper
The Use of Local Systemic Action (LSA) to Develop Conceptual Models and to Solve Problem of Space Science and Technology Management in Indonesia, Sudibyo Sastrohardjono and William Hutchinson
Measurement and observations inside a PC, Geoffrey I. Swan, David Veal, and S Paul Maj
An Examination of Non-Business Usage of the World Wide Web in Two Western Australian Organisations, Craig Valli
The Misuse of the Internet at Work, Craig Valli
The New Homeland Defense, Craig Valli
The Proxy Bakers Dirty Dozen - An Analysis of Abusive Users of a WWW Cache, Craig Valli
With Speed the Hacker Cometh, Craig Valli
If You go Down the Internet Today - Deceptive Honeypots, Craig Valli and Suen Yek
Patterns in fish assemblages 25 years after major seagrass loss, M A. Vanderklift and C A. Jacoby
Cyberspace ethics and information warfare, Matthew Warren and William Hutchinson
Application of Modified Conjugate Directional Filtering in Image Processing, Anthony Craig Watson and Wanwu Guo
Swarming in Information Warfare, Leigh Watson
Wireless Insecurity - Current Issues with Securing Wlan's Utilising 802.11b Technology, Susan Gail Webb
A Rich Storehouse for the Relief of Man's Estate: Education for Knowledge Management, Victoria Wilson, Philip Hingston, and Mark Brogan
Correlation Studies of Seismic Noise at AIGO, Chunnong Zhao, David Coward, David G Blair, R Burston, A Serle, Vincent Cusack, and S Scott
An Image Database for Firearms Identification Based on Images of Cartridge Case and Projectile, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
A Web-Based Image Database and its Image Processing, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
Digital Holography and its Application to Firearm Identification Recording, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
Image Pre-Processing for a Firearm Identification System, Chunnong Zhao, Dongguang Li, and Anthony Craig Watson
Submissions from 2001
Security of telemedical systems for the royal flying doctor service, Colin Armstrong and Helen Armstrong
The virtual campus. a teaching mechanism for security units via the web, Colin Armstrong and Helen Armstrong
Reaching for the stars. A practical case study in securing computer facilities, Helen Armstrong
Benchmarks - are they really useful?, A Boyanich and S P. Maj
Determination of additives in food by capillary electrophoresis, Mary Boyce
Spatial variation of the d13 C signature of Ruppia megacarpa (Mason) in coastal lagoons of south-western Australia and its implication for isotopic studies, Mary C. Boyce, Paul Lavery, Pamela Weatherill, and Pierre Horwitz
A bounded or unbounded universe?: knowledge management in postgraduate LIS Education, Mark Brogan, Philip Hingston, and Victoria Wilson
A case for system dynamics, Craig William Caulfield and Stanislaw Maj
A case for systems thinking and system dynamics, Craig William Caulfield and Stanislaw P. Maj
Web based image database system for ballistic firearm identification, T C. Chase and D G. Li
An intelligent hotel reservation system, Chaiyaporn Chirathamjaree
Potential security breaches and threats in a wireless computing environment, Chirathamjaree and Rajagopal Gururajan
On-Line education: A necessary evil?, Steven Cikara and Stanislaw Maj
Is a Practical Computer Installation and Maintenance Unit Cost Effective, Steven Cikara, David Veal, Anthony Watson, and Stanislaw Maj
Expert system development with kappa-pc, Maurice Danaher
Facilitating learning in conceptual design, Maurice Danaher
Procedural terrain visualisation for internet-based games, Maurice Danaher
Dynamic terrain visualization for web-based games, Maurice Danaher and Warren Creemers
Real - time plant generation, Maurice Danaher and Warren Creemers
Information warfare and cyberwarfare: More than just software tools, Jack Davey
Teaching cyberwarfare tactics and strategy, Jack Davey, Colin Armstrong, and Helen Armstrong
Too much material, too little time: the computer education curriculum dilema, Rick Duley, Stanislaw Maj, and Alastair Boyanich
Teamwork and trust: universities, industry and the professional software engineer, Rick Duley, Stanislaw P. Maj, and David Veal
Conforming curricula for software engineers: observations from the Australian experience, Rick Duley, David Veal, and Stanislaw Maj
To pull in harness: industry and universities face educating the professional software engineer, Rick Duley, David Veal, and Stanislaw Maj
Educating professional software engineers: pathways and progress in the Australian experience, Rick Duley, David Veal, and Stanislaw P. Maj
A unifying classification for bandwidth management, Adalbert Engel and Stanislaw Maj
The effects of reducing bird predation on canopy arthropods of marri (Eucalyptus calophylla) saplings on the Swan Coastal Plain, Western Australia, N.C.P Evelegh, J.D. Majer, and H.F. Recher
Why have birds in the woodlands of southern Australia declined?, Hugh A Ford, Geoffrey W. Barrett, Denis A. Saunders, and Harry F. Recher
Conjugated Linear Feature Enhancement using Conjugate Directional Filtering, Wanwu Guo, Dongguang Li, and Anthony Watson
Directional Filtering as a Multi-Purpose Tool in Image Processing, Wanwu Guo, Dongguang Li, and Anthony Craig Watson
Linear Feature Enhancement Using Directional Filtering and Neural System, Wanwu Guo, Dongguang Li, and Anthony Craig Watson
Application of Fuzzy Logic in Seismic Zonation, Wanwu Guo, Anthony Craig Watson, and Dongguang Li
Identifying Crustal Structure in NE Tibet by Gravity Image Processing, Wanwu Guo, Anthony Watson, and Dongguang Li
Censorship rules: the topology and data topography of Australian adult web sites, D Harte and Mark Brogan
A genetic algorithm for regular inference, Philip Hingston
Inference of regular languages using model simplicity, Philip Hingston
Differential use of seagrass assemblages by a suite of odacid species, Glenn Hyndes and Lachlan D. MacArthur
Using ontological ideas to facilitate the comparison of requirements elicitation methods, Michael Johnstone and Donald Mcdermid
The significance of wireless local networks for the university sector, Kuczborski and Donna Czekalowski
A case study of academia/industry collaboration: The Microsoft authorized academic training program (AATP), Wojciech Kuczborski
Wireless networks create new opportunities for engineering education, Wojciech Kuczborski
The dynamics of unattached benthic macroalgal accumulations in the swan canning estuary, Paul Lavery and H Astill
Assessing biomass, assemblage structure and productivity of algal epiphytes on seagrasses, Paul Lavery and Gary Kendrick
The use of fick's first law for predicting porewater nutrient fluxes under diffusive conditions, Paul Lavery, Carolyn Oldham, and M Ghizaberti
Ecological significance of seagrasses: Assessment for management of environmental impact in Western Australia, Paul Lavery, Derek Walker, K A Hillman, and Alan Kendrick
Science, story, and image: a new approach to crossing the communication barrier posed by scientific jargon, Monica Leggett and M Finlay
Designing effective user interfaces for web courseware, Dongguang Li, Wei Lai, Xiaohua Jia, and J Tanaka
Optical Thin Film Optimisation Design by Genetic Algorithms, Dongguang Li and Anthony Watson
Removing filterable reactive phosphorus from highly coloured stormwater using constructed wetlands, Mark Lund, Paul Lavery, and Raymond Froend
A proposed new high level abstraction for computer technology, S P. Maj, D Veal, and R Duley