Research Output 1984 2018

Filter
Other
2014

An adaptive approach to opportunistic data forwarding in underwater acoustic sensor networks

Nowsheen, N., Goldman, A. (ed.), Karmakar, G. C., Malewicz, G. (ed.) & Kamruzzaman, J. 2014 p. 229 - 236 8 p.

Research output: Contribution to conferenceOtherOther

A novel multi-modal image registration method based on corners

Lv, G., Bouzerdoum, A. (ed.), Teng, S. W., Wang, L. (ed.), Lu, G., Ogunbona, P. (ed.), Li, W. (ed.) & Phung, S. L. (ed.) 2014 p. 1 - 8 8 p.

Research output: Contribution to conferenceOtherOther

CARDAP: a scalable energy-efficient context aware distributed mobile data analytics platform for the fog

Jayaraman, P. P., Manolopoulos, Y. (ed.), Gomes, J. B., Trajcevski, G. (ed.), Nguyen, H. L., Kon-Popovska, M. (ed.), Abdallah, Z. S. E. A., Krishnaswamy, S. & Zaslavsky, A. 2014 p. 192 - 206 15 p.

Research output: Contribution to conferenceOtherOther

Clustering experiments on big transaction data for market segmentation

Singh, A. R., Xu, W. (ed.), Rumantir, G. W., Wang, F. (ed.), South, A. & Bethwaite, B. 2014 p. 1 - 7 7 p.

Research output: Contribution to conferenceOtherOther

Generation of accessible graphics

Goncu, C., Conte, G. (ed.), Marinai, S. & Marriott, K. G. 2014 p. 169 - 174 6 p.

Research output: Contribution to conferenceOtherOther

Market segmentation of EFTPOS retailers

Singh, A. R., Li, X. (ed.), Rumantir, G. W., Liu, L. (ed.), South, A., Ong, K-L. (ed.) & Zhao, Y. (ed.) 2014 p. 19 - 24 6 p.

Research output: Contribution to conferenceOtherOther

Measuring sentiment annotation complexity of text

Joshi, A., Toutanova, K. (ed.), Mishra, A., Wu, H. (ed.), Senthamilselvan, N. & Bhattacharyya, P. 2014 p. 36 - 41 6 p.

Research output: Contribution to conferenceOtherOther

Trustworthy service discovery for mobile social network in proximity

Chang, C., Pesch, D. (ed.), Ling, S., Kumar, M. J. (ed.) & Srirama, S. N. 2014 p. 478 - 483 6 p.

Research output: Contribution to conferenceOtherOther

2013

A defense security approach for infrastructures against hacking

Alsunbul, S., Xiang, Y. (ed.), Le, P. D., Thuraisingham, B. (ed.), Tan, J. & Martinez, G. (ed.) 2013 p. 1600 - 1606 7 p.

Research output: Contribution to conferenceOtherOther

An object-oriented spatial and temporal Bayesian network for managing willows in an American heritage river catchment

Wilkinson, L., Almond, R. G. (ed.), Chee, Y. E., Mengshoel, O. J. (ed.), Nicholson, A. E. & Quintana-Ascencio, P. 2013 p. 77 - 86 10 p.

Research output: Contribution to conferenceOtherOther

Association of ankle brachial pressure index with heart rate variability in a rural screening clinic

Jelinek, H., Murray, A. (ed.), De Silva, D. P., Burstein, F. V., Stranieri, A., Khalaf, K., Khandoker, A. & Al-Aubaidy, H. 2013 p. 755 - 758 4 p.

Research output: Contribution to conferenceOtherOther

Environmental voluntary groups: Towards curating data for sharing, access and preservation

Kennan, M. A., Grove, A. (ed.), Williamson, K. M. C. & Johanson, G. 2013 p. 1 - 10 10 p.

Research output: Contribution to conferenceOtherOther

Online training in Australia

Kuzic, J., Nunes, M. B. (ed.) & McPherson, M. (ed.) 2013 p. 374 - 378 5 p.

Research output: Contribution to conferenceOtherOther

2012

Accessible graphics: Graphics for vision impaired people

Goncu, C. & Marriott, K. 2012 p. 6 1 p.

Research output: Contribution to conferenceOtherOther

A simplex-like search method for bi-objective optimization

Peachey, T. C., Riley, M. J. W., Abramson, D. A. & Stewart, J. 2012 p. 1 - 10 10 p.

Research output: Contribution to conferenceOtherOther

Context-aware Twitter validator (CATVal): A system to validate credibility and authenticity of Twitter content for use in decision support systems

Saguna, S., Respicio, A. (ed.), Zaslavsky, A., Burstein, F. (ed.) & Paris, C. 2012 p. 323 - 334 12 p.

Research output: Contribution to conferenceOtherOther

Database research: Are we at a crossroad? Reflection on NoSQL

Indrawan-Santiago, M. T., Barolli, L. (ed.), Taniar, D. (ed.), Enokido, T. (ed.), Rahayu, W. (ed.) & Takizawa, M. (ed.) 2012 p. 45 - 51 7 p.

Research output: Contribution to conferenceOtherOther

Enablers of online training (OT) in Australia's recreation and other services industry

Kuzic, J., Luzar-Stiffler, V. (ed.), Mesaric, J., Jarec, I. (ed.) & Bekic, Z. (ed.) 2012 p. 213 - 216 4 p.

Research output: Contribution to conferenceOtherOther

Enhancing and developing the practical optimization capabilities and intelligence of automatic design software

Kipouros, T., Clay, S. B. (ed.), Peachey, T. C., Abramson, D. A. & Savill, A. M. 2012 p. 1 - 7 7 p.

Research output: Contribution to conferenceOtherOther

Learning to be energy wise: Discriminative methods for load disaggregation

Rahayu, D. A. P., Fernandez, A. (ed.), Narayanaswamy, B., Prodanovic, M. (ed.), Krishnaswamy, S., Christensen, K. (ed.), Labbe, C. & Seetharam, D. 2012 p. 51 - 54 4 p.

Research output: Contribution to conferenceOtherOther

Mobile data stream mining: From algorithms to applications

Krishnaswamy, S., Chakraborty, D. (ed.), Gama, J. M. P., Lu, H. (ed.), Gaber, M. M. & Venkatasubramanian, N. (ed.) 2012 p. 360 - 363 4 p.

Research output: Contribution to conferenceOtherOther

Mobile phones, family and personal relationships: The case of Indonesian micro-entrepreneurs

Anwar, M., Aberer, K. (ed.), Johanson, G., Flache, A. (ed.), Jager, W. (ed.), Liu, L. (ed.), Tang, J. (ed.) & Gueret, C. (ed.) 2012 p. 216 - 231 16 p.

Research output: Contribution to conferenceOtherOther

Performance evaluation of a decision-theoretic approach for quality of experience measurement in mobile and pervasive computing scenarios

Mitra, K., Duhamel, P. (ed.), Ahlund, C., Lorenz, P. (ed.) & Zaslavsky, A. 2012 p. 2418 - 2423 6 p.

Research output: Contribution to conferenceOtherOther

Priority based expansion of neighbourhood size for heterogeneous traffic routing in WSN

Rizal, M. N., Iqartua, M. A. (ed.), Gondal, I., Cuomo, F. (ed.), Delir Haghighi, P. & Qiu, B. 2012 p. 101 - 106 6 p.

Research output: Contribution to conferenceOtherOther

Project management as a tool of policy implementation

Owen, J., Connor, J. M. & Linger, H. 2012 p. 1 - 3 3 p.

Research output: Contribution to conferenceOtherOther

Reaching the masses and sceptics: Role of smart health information portals in holistic medicine

De Silva, D., Stranieri, A. (ed.), Burstein, F. & Sahama, T. (ed.) 2012 p. 29 - 35 7 p.

Research output: Contribution to conferenceOtherOther

The 'hot' issues in business intelligence: The view of practitioners

O'Donnell, P. A., Respicio, A. (ed.), Sipsma, S., Burstein, F. (ed.) & Watt, C. 2012 p. 101 - 112 12 p.

Research output: Contribution to conferenceOtherOther

The role of leadership in complex projects

Owen, J., Connor, J. M. & Linger, H. 2012 p. 1 - 15 15 p.

Research output: Contribution to conferenceOtherOther

Towards a protocol to measure the social media affordances of web sites and business intelligence systems

Sathyanarayana, P., Respicio, A. (ed.), Tran, P. N. K., Burstein, F. (ed.), Meredith, R. A. & O'Donnell, P. A. 2012 p. 317 - 322 6 p.

Research output: Contribution to conferenceOtherOther

Transforming organizations with business intelligence: Comparing theory with the vendor perspective

Meredith, R. A., Respicio, A. (ed.), Remington, S. M., Burstein, F. (ed.), O'Donnell, P. A. & Sharma, N. 2012 p. 89 - 100 12 p.

Research output: Contribution to conferenceOtherOther

Using ontology for IT-enabled comprehensive management of mass gatherings

Delir Haghighi, P., Respicio, A. (ed.), Burstein, F. V., Burstein, F. (ed.), Arbon, P. A. & Zaslavsky, A. 2012 p. 303 - 314 12 p.

Research output: Contribution to conferenceOtherOther

Where have you been? Using location clustering and context awareness to understand places of interest

Boytsov, A., Andreev, S. (ed.), Zaslavsky, A., Balandin, S. (ed.), Abdallah, Z. & Koucheryavy, Y. (ed.) 2012 p. 51 - 62 12 p.

Research output: Contribution to conferenceOtherOther

2011

Supply chain ERP simulation: A unique learning experience

Hopkins, J., Rajagopalan, B. (ed.), Foster, S. V. & Goes, P. (ed.) 2011 p. 1 - 11 11 p.

Research output: Contribution to conferenceOtherOther

2010

An new holistic security approach for government critical systems: Flooding prevention

Alhabeeb, M., Bandyopadhyay, S. K. (ed.), Almuhaideb, A., Adi, W. (ed.), Le, P. D., Kim, T. (ed.), Srinivasan, B. & Xiao, Y. (ed.) 2010 p. 249 - 264 16 p.

Research output: Contribution to conferenceOtherOther

A novel security approach for critical information systems: Preventing flooding in the non-authenticated client area using a new service from local network service providers

Alhabeeb, M., Ma, J. (ed.), Alsunbul, S., Bacon, L. (ed.), Almuhaideb, A., Du, W. (ed.), Le, P. D., Petridis, M. (ed.) & Srinivasan, B. 2010 p. 49 - 54 6 p.

Research output: Contribution to conferenceOtherOther

Clutter-adaptive visualization for mobile data mining [Demo Paper]

Gillick, B. J., Fan, W. (ed.), Altaiar, H., Hsu, W. (ed.), Krishnaswamy, S., Webb, G. I. (ed.), Liono, J., Liu, B. (ed.), Nicoloudis, N. J., Zhang, C. (ed.), Sinha, A., Gunopulos, D. (ed.), Zaslavsky, A., Wu, X. (ed.) & Gaber, M. M. 2010 p. 1381 - 1384 4 p.

Research output: Contribution to conferenceOtherOther

RnR: A system for extracting rationale from online reviews and ratings [Demo Paper]

Rahayu, D., Maglio, P. P. (ed.), Krishnaswamy, S., Weske, M. (ed.), Labbe, C., Yang, J. (ed.), Alahakoon, O. V. R. & Fantinato, M. (ed.) 2010 p. 717 - 718 2 p.

Research output: Contribution to conferenceOtherOther

Toward a ubiquitous mobile access model: A roaming agreement-less approach

Almuhaideb, A., Ma, J. (ed.), Alharbi, T., Bacon, L. (ed.), Alhabeeb, M., Du, W. (ed.), Le, P. D., Petridis, M. (ed.) & Srinivasan, B. 2010 p. 143 - 148 6 p.

Research output: Contribution to conferenceOtherOther

2008

A personalization approach for problem management

Harroud, H. (ed.), Kang, Y. B., Boulmakoul, A. (ed.), Zaslavsky, A., Ezzat, A. (ed.), Krishnaswamy, S., Bartolini, C. & Peltz, C. (ed.) 2008 p. 269 - 274 6 p.

Research output: Contribution to conferenceOtherOther

The crisis in ICT education: An academic perspective

Koppi, T., Atkinson, R. (ed.), Naghdy, F., McBeath, C. (ed.), Chicharo, J., Sheard, J. I., Edwards, S. & Wilson, D. 2008 p. 505 - 508 4 p.

Research output: Contribution to conferenceOtherOther

2006

Talk about Walkabout: student feedback on a flexible learning initiative

Yuen, K. S. (ed.), Murphy, D., Fraser, J. L. & Casey, D. P. 2006 p. 1 - 13 13 p.

Research output: Contribution to conferenceOtherOther

2005

Improving Location Accuracy by Combining WLAN Positioning and Sensor Technology

Voigt, T. (ed.), Hii, S. H., Rohner, C. (ed.) & Zaslavsky, A. 2005 p. 1 - 5 5 p.

Research output: Contribution to conferenceOtherOther

2004

Inexpensive Telephone Access To Mobile Users Using VOIP

Newmarch, J. & Xia, N. 2004 p. 1 - 5 5 p.

Research output: Contribution to conferenceOtherOther

2003

Quality Criteria Models Used to Evaluate Health Websites

Keane, P. (ed.), Anderson, J. M., McKemmish, S. M. & Manaszewicz, R. 2003 p. 1 - 10 10 p.

Research output: Contribution to conferenceOtherOther

2002

Faculty perceptions of a studio-based teaching and learning environment in a three year IT degree

Lynch, K. E., Carbone, A., Gonsalvez, C. B. & Barnden, A. W. 2002 p. 1094 - 1099 6 p.

Research output: Contribution to conferenceOtherOther

2001

Gardner/Blooms. A Matrix in Practice

Cope, B. (ed.), Lynch, K. E. & Warnod, H. 2001 p. 100 - 100 1 p.

Research output: Contribution to conferenceOtherOther

Scripting Mobile Agents to Support Cooperative Work in the 21st Century

Loke, S. W., Ye, Y. (ed.), Lees, B. (ed.) & Zaslavsky, A. 2001 p. 1 - 10 10 p.

Research output: Contribution to conferenceOtherOther