Research Services Division

Deakin Research

2002 School of Information Technology Research Output

Note: The 2012, 2013, 2014 publications have not been audited.

Jump to: Publications | Grants and Consultancies | HDR completions

Publications

Beliakov, Gleb (2002) Approximation of membership functions and aggregation operators using splines, Technologies for constructing intelligent systems, pp. 159-172, Physica-Verlag, Heidelberg, Germany [B1]
DRO entry for this publication

Goscinski, Andrzej, Hobbs, Michael* and Silcock, Jacqueline (2002) The genesis cluster operating system supporting parallel processing, High performance computing systems and applications, pp. 301-313, Kluwer Academic Publishers, The Netherlands [B1]
DRO entry for this publication

Goscinski, Andrzej (2002) Toward a cluster operating system that offers a single system image, Distributed and parallel systems cluster and grid computing, pp. 3-11, Kluwer Academic Publishers, Boston, Mass. [B1]
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2002) Manipulating reality: deception on the web, Make or break issues in IT management, pp. 300-312, Butterworth-Heinemann, Oxford, England [B1]
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2002) Deception and reality: a challenge for the information and knowledge management function, Human factors in information systems, pp. 287-295, IRM Press, Hershey, PA [B1]
DRO entry for this publication

Webb, Geoffrey (2002) Integrating machine learning with knowledge acquisition, in Leondes, Cornelius T. (eds), Expert systems : the technology of knowledge management and decision making for the 21st century, pp. 937-959, Academic, San Diego, Calif. [B1]
DRO entry for this publication

Batten, Lynn M. and Beliakov, Gleb (2002) Fast algorithm for the cutting angle method of global optimization, Journal of global optimization, vol. 24, no. 2, pp. 149-161, Springer, Dordrecht, The Netherlands [C1]
ERA journal ID: 246 – Scopus EID: Not tagged
Citation counts: Thomson - 17
DRO entry for this publication

Batten, Lynn (2002) Decompositions of finite projective planes, International mathematical journal, vol. 1, no. 2, pp. 149-159, International Scientific Publications, Japan [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Beliakov, Gleb (2002) Monotone approximation of aggregation operators using least squares splines, International journal of uncertainty, fuzziness, and knowledge-based systems, vol. 10, no. 6, pp. 659-676, World Scientific, Singapore [C1]
ERA journal ID: 36063 – Scopus EID: 2-s2.0-0036960180
Citation counts: Scopus - 19, Thomson - 18
DRO entry for this publication

Brooks, Warren, Warren, Matthew and Hutchinson, W.* (2002) A security evaluation criteria, Logistics information management, vol. 15, no. 5/6, pp. 377-384, MCB University Press (Emerald), Bingley, England [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Carminati, John and Zakhary, Emil (2002) On the problem of algebraic completeness for the invariants of the Riemann tensor. III., Journal of mathematical physics, vol. 43, no. 8, pp. 4020-4034, American Institute of Physics, New York, N.Y. [C1]
ERA journal ID: 258 – Scopus EID: 2-s2.0-0035981745
Citation counts: Scopus - 9
DRO entry for this publication

Carminati, J., Zakhary, E. and McLenaghan, R. G.* (2002) On the problem of algebraic completeness for the invariants of the Riemann tensor. II, Journal of mathematical physics, vol. 43, no. 1, pp. 492-507, American Institue of Physics (API), Melville, N.Y. [C1]
ERA journal ID: 258 – Scopus EID: 2-s2.0-0035981965
Citation counts: Scopus - 10, Thomson - 9
DRO entry for this publication

Coulter, Robert S. and Matthews, Rex W.* (2002) On the permutation behaviour of Dickson polynomials of the second kind, Finite fields and their applications, vol. 8, no. 4, pp. 519-530, Academic Press, Maryland Heights, MO [C1]
ERA journal ID: 153 – Scopus EID: 2-s2.0-0036814926
Citation counts: Scopus - 3, Thomson - 3
DRO entry for this publication

Coulter, Robert S. and Henderson, Marie* (2002) The compositional inverse of a class of permutation polynomials over a finite field, Bulletin of the Australian mathematical society, vol. 65, no. 3, pp. 521-526, Australian Mathematical Society, St. Lucia, Qld. [C1]
ERA journal ID: 73 – Scopus EID: 2-s2.0-0036592868
Citation counts: Scopus - 3
DRO entry for this publication

Frayman, Yakov, Wang, Lipo* and Wan, Chunru* (2002) Cold rolling mill thickness control using the cascade-correlation neural network, Control and cybernetics, vol. 31, no. 2, pp. 327-342, Polish Academy of Sciences, Systems Research Institute, Warszawa, Poland [C1]
ERA journal ID: 17824 – Scopus EID: 2-s2.0-0036909880
Citation counts: Scopus - 3
DRO entry for this publication

Goscinski, Andrzej, Hobbs, Michael and Silcock, Jackie (2002) GENESIS: an efficient, transparent and easy to use cluster operating system, Parallel computing, vol. 28, no. 4, pp. 557-606, Elsevier Science BV, Amsterdam, Netherlands [C1]
ERA journal ID: 18102 – Scopus EID: 2-s2.0-0036534646
Citation counts: Scopus - 25, Thomson - 12
DRO entry for this publication

Horan, Peter (2002) Eiffel assertions and the external structure of classes and objects, Journal of object technology, vol. 1, no. 4, pp. 105-118, Chair of Software Engineering, ETH Eidgenössische Technische Hochschule, Zürich, Switzerland [C1]
ERA journal ID: 32137 – Scopus EID: 2-s2.0-3042546819
Citation counts: Scopus - 2
DRO entry for this publication

Huang, Fuchun and Ogata, Yosihiko* (2002) Generalized pseudo-likelihood estimates for markov random fields on lattice, Institute of statistical mathematics. Annals, vol. 54, no. 1, pp. 1-18, Springer, Heidelberg, Germany [C1]
ERA journal ID: 777 – Scopus EID: 2-s2.0-6444245814
Citation counts: Scopus - 18, Thomson - 15
DRO entry for this publication

Hutchinson, Bill* and Warren, Matthew (2002) Information warfare: using the viable system model as a framework to attack organisations, AJIS : Australian journal of information systems, vol. 9, no. 2, pp. 67-74, University of Wollongong, Wollongong, N.S.W. [C1]
ERA journal ID: 19280 – Scopus EID: Not tagged
DRO entry for this publication

Hutchinson, W.* and Warren, M. (2002) Truth, lies, reality and deception : an issue for e-commerce, International journal of services technology and management, vol. 3, no. 2, pp. 208-221, Inderscience Enterprises, London, England [C1]
ERA journal ID: 19357 – Scopus EID: 2-s2.0-24644437279
DRO entry for this publication

Lozanovski, Con* and Carminati, John (2002) On an alignment condition of the weyl tensor, General relativity and gravitation, vol. 34, no. 6, pp. 853-863, Plenum Press, New York, N.Y. [C1]
ERA journal ID: 1099 – Scopus EID: Not tagged
Citation counts: Scopus - 8, Thomson - 8
DRO entry for this publication

Warren, Matthew (2002) Security practice: survey evidence from three countries, Logistics information management, vol. 15, no. 5/6, pp. 347-351, MCB University Press (Emerald), Bingley, England [C1]
ERA journal ID: Not matching ERA journal list
DRO entry for this publication

Zhou, Wanlei and Jia, Weijia* (2002) A token-based independent update protocol for managing replicated objects, International journal of computer systems science and engineering, vol. 17, no. 3, pp. 189-207, CRL Publishing Ltd, London, UK [C1]
ERA journal ID: 17806 – Scopus EID: 2-s2.0-0036565145
Citation counts: Scopus - 1
DRO entry for this publication

Batten, Lynn and Whiten, B.* (2002) Inferring eye movements on the basis of head and visual target position, in Hewitt, John (eds), Proceedings of the 2001 Mathematics-in-Industry Study Group : held at University of South Australia Adelaide, Australia 29 January - 2 February 2001, pp. 41-59, Australian Mathematical Society, Adelaide, S. Aust. [E1]
DRO entry for this publication

Batten, Lynn and Warren, Matthew (2002) Information warfare incident monitoring - government or public responsibility?, in William Hutchinson (ed.), Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, pp. 261-274, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Beliakov, Gleb (2002) Global optimization of neural networks, in Zadeh, Lotfi (eds), Intelligent systems for information processing : from representation to applications, pp. 719-725, North Holland, Amsterdam, The Netherlands [E1]
DRO entry for this publication

Beliakov, Gleb and Abraham, Ajith* (2002) Global optimisation of neural networks using a deterministic hybrid approach, in Abraham, Ajith (eds), Hybrid information systems, pp. 79-92, Physica-Verlag, Heidelburg, Germany [E1]
DRO entry for this publication

Beliakov, Gleb (2002) Three new techniques of approximating aggregation operators from empirical data, in Zadeh, Lotfi (eds), Intelligent systems for information processing : from representation to applications, pp. 945-952, North Holland, Amsterdam, The Netherlands [E1]
DRO entry for this publication

Brain, Damien and Webb, Geoffrey I. (2002) The need for low bias algorithms in classification learning from large data sets, in Elomaa, Tapio; Mannila, Heikki and Toivonen, Hannu (eds), PKDD 2002 : Principles of Data mining and Knowledge Discovery : 6th European Conference Proceedings, pp. 62-73, PKDD, Helsinki, Finland [E1]
DRO entry for this publication

Brooks, W. and Warren, Matthew (2002) Baseline security standards evaluation, in Hutchinson, William (eds), Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, pp. 162-173, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Brooks, Warren, Warren, Matthew and Hutchinson, W.* (2002) A security evaluation criteria for baseline security standards, in Ghonaimy, M. Adeeb; El-Hadidi, Mahmoud T. and Aslan, Heba K. (eds), Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives, pp. 79-89, 2002, Springer; Kluwer, B.V., Berlin/Heidelberg, Germany; The Netherlands [E1]
DRO entry for this publication

Brooks, W. and Warren, Matthew (2002) Information security management within Australian healthcare organisations, in Hutchinson, William (eds), Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, pp. 318-331, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A. [E1]
DRO entry for this publication

Busuttil, T. and Warren, Matthew (2002) A formalisation of an information infrastructure security risk analysis approach, in Hutchinson, William (eds), Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, pp. 174-182, Edith Cowan University, School of Management Information Systems, Churchlands, W.A. [E1]
DRO entry for this publication

Busuttil, Tyrone and Warren, Matthew (2002) A conceptual approach to information warfare : security risk analysis, in Hutchinson, Bill (eds), ECIW2003 : proceedings of the 2nd European conference on Information Warfare and Security, pp. 35-41, Management Centre International Ltd, Reading, England [E1]
DRO entry for this publication

Chowdhury, Morshed U., Ray, Siddheswar* and Pham, Thao (2002) A new approach for reducing blocking artefacts using linear filter for block based transform coded images, in Unknown (ed.), ACIS 2002 : International Conference on Computer Science, Information Technology, e-Business, and Applications (CSITeA '02), pp. 1-4, International Association for Computer & Information Science (ACIS), Foz do Iguazu, Brazil [E1]
DRO entry for this publication

Dai, Honghua and Li, Gang (2002) An improved approach for the discovery of causal models via MML, in Chen, Ming-Syan; Yu, Philip S. and Liu, Bing (eds), Advances in knowledge discovery and data mining : 6th Pacific-Asia conference, PAKDD 2002, Taipei, Taiwan, May 6-8, 2002 : proceedings, pp. 304-315, Springer Berlin, Berlin, Germany [E1]
DRO entry for this publication

Dai, Honghua, Zhuang, L., Wang, Z. and Yao, M.* (2002) A rough set based noise and missing value tolerant learning approach, in Nguyen, Hoang Phoung; Nguyen, H. and Santiprabhob, P. (eds), Proceedings of the Third International Conference on Intelligent Technologies and Third Vietnam-Japan Symposium on Fuzzy Systems and Applications : InTech/VJFuzzy'2002 ; Hanoi, Vietnam, December 3 - 5, 2002, pp. 210-218, Science and Technics Publishing House, Hanoi, Vietnam [E1]
DRO entry for this publication

Dai, H., Li, Gang and Tu, Yiqing (2002) An empirical study of encoding schemes and search strategies in discovering causal networks, in Elomaa, Tapio; Mannila, H. and Toivonen, H. (eds), Machine Learning: ECML 2002: Proceedings of the 13th European Conference on Machine Learning, pp. 48-59, Springer Berlin, Berlin, Germany [E1]
DRO entry for this publication

Frayman, Yakov, Rolfe, Bernard F. and Webb, Geoffrey I. (2002) Solving regression problems using competitive ensemble models, in McKay, Bob and Slaney, John (eds), AI 2002 : Advances in artificial intelligence : proceedings of the 15th Australian Joint Conference on Artificial Intelligence, pp. 511-522, Springer, Berlin, Germany [E1]
DRO entry for this publication

Frayman, Yakov, Rolfe, Bernard, Hodgson, Peter and Webb, G.I (2002) Predicting the rolling force in hot steel rolling mill using an ensemble model, in Hamza, M.H. (eds), Artificial intelligence and applications: proceedings of the second IASTED International Conference, pp. 143-148, ACTA Press, New York, N.Y. [E1]
DRO entry for this publication

Frayman, Yakov, Rolfe, Bernard and Webb, G. (2002) Improving an inverse model of sheet metal forming by neural network based regression, in Kazerounian, Kazem (eds), Proceedings of the 2002 ASME Design Engineering Technical Conferences and Computers and Information in Engineering Conference, pp. 1-12, American Society of Mechanical Engineers, New York, N.Y. [E1]
DRO entry for this publication

Garner, Brian and van der Klooster, Marie (2002) Tacit knowledge requirements in software quality assurance, in Arabnia, Hamid R.; Al-Ani, Ban and Mun, Youngsong (eds), Proceedings of the International Conference on Software Engineering Research and Practice SERP 03, pp. 590-596, CSREA Press, Las Vegas, Nevada [E1]
DRO entry for this publication

Goold, Annegret and Horan, Peter (2002) Foundation software engineering practices for capstone projects and beyond, in Lethbridge, Timothy (eds), Proceedings 15th Conference on Software Engineering Education and Training (CSEE&T 2002), pp. 140-146, IEEE Xplore, Piscataway, N.J. [E1]
DRO entry for this publication

Goscinski, Andrzej, Hobbs, Michael and Silcock, Jackie (2002) Toward an operating system that supports parallel processing on nondedicated clusters, in Wyrzykowski, Roman; Dongarra, Jack; Paprzycki, Marcin and Waśniewski, Jerzy (eds), PPAM 2001 : Parallel processing and applied mathematics : 4th international conference, PPAM 2001, Nałęczów, Poland, September 9-12, 2001 : proceedings, pp. 340-353, Springer-Verlag Berlin Heidelberg, Berlin, Germany [E1]
DRO entry for this publication

Goward, Penelope, Warren, Matthew and Leitch, Shona (2002) E-universities : - business and technology (an Australian viewpoint), in Roccetti, Marco (eds), Euromedia 2002 : proceedings of the seventh annual scientific conference on web technology, new media, communications and telematics theory, methods, tools and applications, pp. 7-10, EUROSIS, Ghent, Belgium [E1]
DRO entry for this publication

Hang, Xiaoshu, Huang, He* and Xiong, Fanlun* (2002) A general rooted tree drawing algorithm, in Sui, Wei (eds), Second International Conference on Image and Graphics, pp. 1022-1029, SPIE, International Society for Optical Engineering, Bellingham, Wash [E1]
DRO entry for this publication

Henderson, M.*, Coulter, R., Dawson, E.* and Okamoto, E.* (2002) Modelling trust structures for public key infrastructures, in Batten, Lynn and Seberry, Jennifer (eds), ACISP 2002 : Information Security and Privacy : Proceedings of the 7th Australasian Conference, pp. 56-70, Springer-Verlag, New York, N.Y. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2002) Internet banking: security, ethics and trust, in Warren, Matthew and Barlow, John (eds), Conference proceedings of AiCE 2002, Third Australian Institute of Computer Ethics Conference, pp. 52-62, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2002) E-security guides for Australian SMEs, in Lethbridge, Nick (eds), E-conomy - from here to where? : proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, pp. 1-11, Edith Cowan University, Churchlands, W.A. [E1]
DRO entry for this publication

Hutchinson, Damien and Warren, Matthew (2002) A conceptual model for security and trust within internet banking transactions, in Unknown (ed.), Association for Information Systems 8th Americas Conference on Information Systems : AMCIS 2002 ; August 8 - 11, 2002, Dallas, Texas., pp. 2228-2234, Association for Information Systems, Atlanta, Ga. [E1]
DRO entry for this publication

Hutchinson, W.* and Warren, Matthew (2002) Network theory - the demise of systems thinking?, in Lovell, Brian C. (eds), ANZIIS 2003 : proceedings of the Eighth Australia and New Zealand Intelligent Information Systems Conference, Dec. 10-12, Sydney, Australia, Queensland University of Technology, Brisbane, Qld. [E1]
DRO entry for this publication

Hutchinson, W.* and Warren, Matthew (2002) Developing a postgraduate course in information security: a confusion of terms, in Wenn, A.; McGrath, M. and Burstein, F. (eds), Enabling organisations and society through information systems : proceedings of the thirteenth Australasian Conference on Information Systems : 4-6 December 2002 Melbourne, Australia, pp. 805-812, Victoria University, Melbourne, Australia [E1]
DRO entry for this publication

Hutchinson, William* and Warren, Matthew (2002) Information superiority and the role of an organisation's network, in Furnell, Steven (eds), Papers from the Third International Network Conference 2002 : 16-18 July 2002, Plymouth, United Kingdom, pp. 567-572, Emerald, Bradford, England [E1]
DRO entry for this publication

Islam, Md. Rafiqul* and Chowdhury, Morshed (2002) Eliminating of the drawback of existing testing technique of easily testable PLAs using an improved testing algorithm with product line rearrangement, in Subramanya, S. R. (eds), International Society for Computers and their Applications : 15th International conference on computer applications in industry and engineering, pp. 239-242, International Society for Computers and their Applications, Cary, N.C. [E1]
DRO entry for this publication

Lan, Mingjun, Yu, Shui, Bacher, R. and Zhou, Wanlei (2002) A co-recommendation algorithm for web searching, in Zhou, Wanlei; Chi, Xue-bin; Goscinski, A. and Li, Guo-jie (eds), Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing, pp. 479-482, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Leitch, Shona and Warren, Matthew (2002) Designing ethical systems for electronic commerce, in Warren, Matthew (eds), Conference proceedings of AiCE 2002 Sydney, September 30th, 2002, third Australian Institute of Computer Ethics Conference : computer ethics, its impact upon Australia, pp. 68-74, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Li, Chun-Sheng*, Zhang, Chenq-Qi* and Zhang, Zili (2002) An agent-based intelligent system for information gathering from world wide web environment, in Tang, Y.Y. (eds), 2002 International Conference on Machine Learning and Cybernetics : proceedings : November 4-5, 2002, Prime Hotel, Beijing, China, pp. 1852-1857, IEEE Xplore, Piscataway, N.J. [E1]
DRO entry for this publication

Li, C.*, Zhang, C.* and Zhang, Z. (2002) An agent-based middleware for uniform operation in a heterogeneous database environment, in Wang, Lipo; Chen Tan, Kay; Furuhashi, Takeshi; Kim, Jong-Hwan and Yao, Xin (eds), SEAL'02 : proceedings of the 4th Asia-Pacific Conference on Simulated Evolution and Learning, November 18-22, 2002, Orchid Country Club, Singapore, pp. 385-389, Nanyang Technological University, Singapore [E1]
DRO entry for this publication

Li, Gang, Dai, Honghua and Tu, Yiqing (2002) Linear causal model discovery using the MML criterion, in Kumar, Vipin; Tsumoto, S.; Zhong, N.; Yu, P. and Wu, X. (eds), Proceedings of the 2002 IEEE International Conference on Data Mining, pp. 274-281, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

McKay, Elspeth*, Garner, Brian and Okamoto, Toshio* (2002) Understanding the ontological requirements for collaborative web-based experiential learning, in Kinshuk, R.; Lewis, R.; Akahir, K.; Kemp, R.; Okamoto, T.; Henderson, L. and Lee, C-H. (eds), International Conference on Computers in Education : proceedings, December 3-6, 2002 Auckland, New Zealand, pp. 356-357, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Newlands, Douglas and Brain, Damien (2002) The window algorithm, in Zanasi, A; Brebbia, C; Ebecken, N and Melli, P (eds), Data Mining III : Proceedings of the third international conference on data mining held in 2002 at Bologna., pp. 395-404, WIT Press, Southampton, England [E1]
DRO entry for this publication

Pearce, James E.*, Webb, Geoffrey I., Shaw, Robin and Garner, Brian (2002) A systemic approach to the database marketing process, in Shaw, R.; Adam, S. and McDonald, H. (eds), Proceedings of the Australian and New Zealand Marketing Academy Conference, pp. 2941-2948, ANZMAC, Geelong, Vic. [E1]
DRO entry for this publication

Pearce, J.E.*, Shaw, Robin, Webb, G.I.* and Garner, Brian (2002) Experimentation and self learning in continuous database marketing, in Kumar, Vipin (eds), 2002 IEEE International Conference on Data Mining : proceedings : 9-12 December, 2002, Maebashi City, Japan, pp. 775-778, IEEE Xplore, Piscataway, N.J. [E1]
DRO entry for this publication

Rolfe, Bernard, Frayman, Yakov, Hodgson, Peter, Webb, G.I. and Kelly, Georgina (2002) Fault detection in a cold forging process through feature extraction with a neural network, in Hamza, M.H. (eds), Artificial intelligence and applications: proceedings of the second IASTED Conference, pp. 155-159, ACTA Press, New York, N.Y [E1]
DRO entry for this publication

Rough, Justin and Goscinski, Andrzej (2002) Exploiting operating system services to efficiently checkpoint parallel applications in GENESIS, in Zhou, Wanlei; Chi, Xue-bin; Goscinski, Andrzej and Li, Guo-jie (eds), 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, pp. 261-268, IEEE Xplore, Piscataway, N.J. [E1]
DRO entry for this publication

Sandhu, Kamaljeet and Corbitt, Brian (2002) Implementing web-based electronic services : a case study, in Wenn, Andrew; McGrath, Michael and Burstein, Frada (eds), Enabling organisations and society through information systems : proceedings of the thirteenth Australasian Conference on Information Systems : 4-6 December 2002 Melbourne, Australia, pp. 699-709, School of Information Systems, Victoria University, Melbourne, Vic. [E1]
DRO entry for this publication

Satti, Muhammad M.*, Garner, Brian and Nagrial, Mahmood H.* (2002) Information security standards for e-business, in Wong, Lawrence (eds), 8th IEEE International Conference on Communication Systems, pp. 1-5, IEEE Computer Society, Piscataway, N.J. [E1]
DRO entry for this publication

Stagg, V. and Warren, Matthew (2002) Defending infrastructures against information warfare, in Khosrow-Pour, Mehdi (eds), Issues and trends of information technology management in contemporary organizations : 2002 Information Resources Management Association International Conference, Seattle, Washington, USA, May 19-22, 2002, Idea Group Pub., Hershey, Pa. [E1]
DRO entry for this publication

Stagg, V. and Warren, Matthew (2002) Asymmetric scalability: the unfair advantage of information warfare, in Hutchinson, William (eds), Protecting the infrastructure : proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, Western Australia, 28 & 29 November 2002, pp. 290-297, Edith Cowan University, Churchlands, W.A. [E1]
DRO entry for this publication

Subramanya, S.*, Chowdhury, Morshed and Pham, Thao (2002) Adaptive DCT coding of images using block categorization, in Arabnia, Hamid R. and Mun, Youngsong (eds), CISST'02 : proceedings of the International Conference on Imaging Science, Systems, and Technology : Las Vegas, Nevada, USA, June 24-27, 2002, pp. 386-390, CSREA Press, Athens, Ga. [E1]
DRO entry for this publication

Tu, Y., Zhuang, L., Li, Gang and Dai, Honghua (2002) A Java applet for causal discovery, in Hoang Phuong, Nguyen; Nguyen, H. and Santiprabhob, P. (eds), Proceedings of the Third International Conference on Intelligent Technologies and Third Vietnam-Japan Symposium on Fuzzy Systems and Applications : InTech/VJFuzzy'2002 ; Hanoi, Vietnam, December 3 - 5, 2002, pp. 262-266, Science and Technics Publishing House, Hanoi, Vietnam [E1]
DRO entry for this publication

Vasiu, L., Warren, Matthew and Mackay, David (2002) Personal privacy issues in B2C eCommerce: a theoretical framework, in Cooper, Joan; Burgess, Lois; Alcock, Carole and Win, Khin Than (eds), CollECTeR 2002: Proceedings of the Seventh CollECTeR Conference on Electronic Commerce, pp. 1-8, Faculty of Informatics, University of Wollongong, Wollongong, N.S.W. [E1]
DRO entry for this publication

Vasiu, L., Mackay, David and Warren, Matthew (2002) A conceptual framework of eFraud from a supply chain management perspective, in Lethbridge, Nick (eds), E-conomy - from here to where? : Proceedings : 3rd International We-B Conference 2002, Perth, Western Australia 28 & 29 November, 2002, pp. 1-9, Edith Cowan University, Churchlands, W.A. [E1]
DRO entry for this publication

Wan, H.*, Chowdhury, Morshed, Hu, H.* and Shi, Z.* (2002) A new texture spectrum descriptor and its application in image semantic classification, in Gantenbein, R. and Shin, S. (eds), Computers and their applications : proceedings of the ISCA 17th International Conference, San Francisco, California, USA, April 4-6, 2002, pp. 176-179, International Conference on Computers and Their Applications, Cary, NC [E1]
DRO entry for this publication

Wang, Z., Zhou, P.* and Dai, Honghua (2002) A heuristic objects reduction algorithm based on the tolerance relation matrix, in Yunsheng, Liu (eds), Proceedings of International Symposium on Future Software Technology ISFST' 2002, pp. 388-393, ISFST, Wuhan, China [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2002) Will new laws be effective in reducing web sponsorship of terrorist groups?, in Hutchinson, William; Edith Cowan University School of Computer and Information Science and Edith Cowan University School of Management Information Systems. We-B Centre (eds), Protecting the Infrastructure: Proceedings of the 3rd Australian Information Warfare and Security Conference 2002, pp. 156-161, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, WA [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, W.* (2002) Australian hackers: an ethical perspective, in Warren, Matthew and Barlow, John (eds), Third Australian Institute of Computer Ethics Conference Proceedings: Computer Ethics: Its Impact for Australia, pp. 131-138, Deakin University, Geelong, Vic. [E1]
DRO entry for this publication

Warren, Matthew and McIntyre, J. (2002) Protection of New Zealand in the age of information warfare, in Hutchinson, William (eds), Protecting the infrastructure: proceedings : 3rd Australian Information Warfare & Security Conference 2002, Perth, pp. 235-240, Edith Cowan University, School of Management Information Systems, We-B Centre, Perth, WA [E1]
DRO entry for this publication

Warren, Matthew and Batten, Lynn (2002) Security management: an information systems setting, in Batten, Lynn (eds), Information Security and Privacy: Proceedings of the 7th Australasian Conference, ACISP 2002, pp. 257-270, Springer Verlag, Berlin/Heidelberg, Germany [E1]
DRO entry for this publication

Warren, Matthew and Hutchinson, William* (2002) Security risk analysis e-commerce, in Furnell, Steven and Dowland, Paul (eds), INC2002 : Proceedings of the Third International Network Conference, pp. 397-404, Centre for Information Security & Network Research, University of Plymouth, Plymouth, England [E1]
DRO entry for this publication

Warren, Matthew, McDougall, M. and Pascoe, K. (2002) Swarming attacks and agents, in Hutchinson, William (eds), Protecting the infrastructure: proceedings of the 3rd Australian Information Warfare and Security conference 2002, pp. 209-217, Edith Cowan University, School of Management Information Systems, We-B Centre, Perth, WA [E1]
DRO entry for this publication

Webb, Geoffrey* and Brain, Damien (2002) Generality is predictive of prediction accuracy, in Yamaguchi, Takahira (eds), Proceedings of PKAW '02 : the 2002 Pacific Rim Knowledge Aquisition Workshop, pp. 117-130, JSAI NII, Japan [E1]
DRO entry for this publication

Xiang, Yang, Ping, Yang* and Zhou, Wanlei (2002) Object oriented finite element analysis: a distributed approach to mesh generation, in Zhou, Wanlei; Chi, X.; Goscinski, A. and Li, G. (eds), 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, pp. 92-99, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Xiang, Yang and Zhou, Wanlei (2002) The design and development of an integrated system for object-oriented finite element computing, in Zhou, Wanlei; Chi, X.; Goscinski, A. and Li, G. (eds), 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, pp. 201-204, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Yang, Ying and Webb, Geoffrey I. (2002) Non-disjoint discretization for naive-bayes classifiers, in Sammut, Claude and Hoffmann, Achim (eds), ICML 2002 : Proceedings of the Nineteenth International Conference on Machine Learning, pp. 666-673, ICML, Sydney, N.S.W. [E1]
DRO entry for this publication

Yu, Shui, Zhou, Wanlei, Zhao, Ying*, Lan, Mingjun and Xiang, Yang (2002) A web-DB model on multicast and anycast, in Zhou, Wanlei; Chi, X.; Goscinski, A. and Li, G. (eds), Proceedings of the 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, pp. 412-415, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Yu, Shui, Zhou, Wanlei and Wu, Yue* (2002) Research on network anycast, in Zhou, Wanlei; Chi, X.; Goscinski, A. and Li, G. (eds), 2002 5th International Conference on Algorithms and Architectures for Parallel Processing : ICA3PP/2002 : Beijing, China, October 23-25, 2002, pp. 154-161, IEEE Computer Society, Los Alamitos, Calif. [E1]
DRO entry for this publication

Yu, Shui, Zhou, Wanlei, Huang, Fuchun and Lan, Mingjun (2002) An efficient algorithm for application-layering anycasting, in Plaice, John (eds), DCW 2002 : Distributed communities on the Web : 4th international workshop, DCW 2002, Sydney, Australia, April 3-5, 2002 : revised papers, pp. 74-83, Springer, Berlin, Germany [E1]
DRO entry for this publication

Zhang, Chengqi*, Li, Chunsheng* and Zhang, Zili (2002) An agent-based framework for petroleum information services from distributed heterogeneous data resources, in Strooper, Paul and Muenchaisri, Pornsiri (eds), APSEC 2002: Ninth Asia-Pacific Software Engineering Conference, pp. 593-602, Institute of Electrical and Electronics Engineers, Los Alamitos, Calif. [E1]
DRO entry for this publication

Zhang, Zili, Zhang, Cheng-Qi* and Li, Yuefeng* (2002) Initial value generation for matchmaking in middle agents, in Shi, Zhongzhi and He, Qing (eds), Proceedings of International Conferences on Intelligent Information Technology, ICIIT 2002 - Beijing, pp. 12-18, People's Posts & Telecommunications, Beijing, China [E1]
DRO entry for this publication

Zhang, Zili and Zhang, Chengqi* (2002) An application of fuzzy cluster analysis to matchmaking in middle agents, in Wang, Lipo; Halgamuge, Saman and Yao, Xin (eds), FSKD'02 : proceedings of the 1st International Conference on Fuzzy Systems and Knowledge Discovery, November 18-22, 2002, Orchid Country Club, Singapore, pp. 566-570, Nanyang Technological University, Singapore [E1]
DRO entry for this publication

Zhang, Zili and Zhang, Chengqi* (2002) An improvement to matchmaking algorithms for middle agents, in Johnson, W. Lewis and Castelfranchi, Cristiano (eds), Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems : July 15-19, 2002, Plazzo re Enzo, Bologna, Italy, pp. 1340-1347, ACM Press, New York, N.Y. [E1]
DRO entry for this publication

Zhang, Zili and Zhang, Chengqi* (2002) An agent-based hybrid intelligent system for financial investment planning, in Mitsuru Ishizuka, Abdul Sattar (eds), Trends in artificial intelligence, pp. 355-364, Springer-Verlag Berlin Heidelberg, Heidelberg, Germany [E1]
DRO entry for this publication

Zhao, Ying*, Zhou, Wanlei, Huang, Jiumei*, Yu, Shui and Lanham, Elicia (2002) Self-adaptive clock synchronization for computational grid, in Han, Yanbo and Shi, Meilin (eds), GCC 2002 : Proceedings of the grid and cooperative computing international workshop, pp. 932-942, Publishing House of Electronics Industry, Beijing, China [E1]
DRO entry for this publication

Zhou, B., Goscinski, Andrzej and Brent, R. P.* (2002) Concerning the length of time slots for efficient gang scheduling, in Horiguchi, Susumu and Shen, Hong (eds), PDCAT 2002 : Third International Conference on Parallel and Distributed Computing, Applications and Technologies : September 3-6, 2002, Kanazawa, Japan, pp. 364-371, Australian National University, Canberra, A.C.T. [E1]
DRO entry for this publication

Zhou, Wanlei and Wang, Li* (2002) An analysis of update ordering in a cluster of replicated servers, in Zhou, Wanlei,; Chi, Xue-bin; Goscinski, Andrzej and Li, Guo-jie (eds), Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing, pp. 28-35, IEEE, Los Alamitos, Calif. [E1]
DRO entry for this publication

Zhou, Wanlei, Ye, H. and Chen, C. (2002) Comparison of the LMS with RLS for communication technology, in Han, Yanbo and Shi, Meilin (eds), Proceedings of the International Workshop on Grid and Cooerative Computing, pp. 737-744, Publishing House of Electronics Industry, Beijing, China [E1]
DRO entry for this publication

Goscinski, A. (2002) A single system image operating system for next generation application software, in Glowacz, Prof. Zygfryd (eds), Proceedings of the International Conference on Modern Directions in Electrotechnics, Automatics, Computer Science, Electronics and Telecommunication, pp. 147-152, University of Mining and Metallurgy, Crakov, Poland, Cracov, Poland [E2]
DRO entry for this publication

Sandhu, Kamaljeet and Corbitt, Brian (2002) Insights and implications of web-based e-service end-user adoption, in McColl-Kennedy, Janet R. and Rundle-Thiele, Sharyn (eds), Proceedings of the International Services Marketing Conference 2002 : Emerging issues in services marketing: emotions, e-marketing and encounters : Brisbane, Queensland, Australia 3-5 July 2002, pp. 143-145, Graduate School of Management, University of Queensland, St. Lucia, Qld. [E3]
DRO entry for this publication

Batten, Lynn (2002) ACISP 2002 : Information security and privacy : 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings, in Batten, Lynn (eds), Springer, Berlin, Germany [E4]
DRO entry for this publication

Warren, Matthew and Barlow, John* (2002) AICE 2002 : Conference proceedings of AiCE 2002 Sydney, September 30th, 2002, third Australian Institute of Computer Ethics Conference : computer ethics, its impact upon Australia, in Warren, Matthew and Barlow, John (eds), School of Information Technology, Deakin University, Geelong, Vic. [E4]
DRO entry for this publication

Zhou, Wanlei, Chi, Xue-bin*, Goscinski, Andrzej and Li, X* (2002) ICA3PP 2002 : Proceedings of the Fifth International Conference on Algorithms and Architectures for Parallel Processing, in Zhou, Wanlei; Chi, Xue-bin; Goscinski, Andrzej and Li, X (eds), IEEE Computer Society, Los Alamitos, Calif. [E4]
DRO entry for this publication

Webb, Geoff (2002) Magnum Opus, RuleQuest Research, St Ives, N.S.W. [J1]
DRO entry for this publication

Grants and Consultancies

Grants with funding during 2002

Research Income - National Competitive Grants

Kloeden, P and Ivanov, A. Computer visualisation of chaotic delay equations, Australian Research Council Small Grant [T]

  • 1995: $9,684

Goscinski, A, Horan, P and Gerrity, G*. Performance studies of distributed operating systems based on the Rhodos system, Australian Research Council Large Grant [T]

  • 1995: $44,768

Ivanov, A. Perturbations of Difference Equations, Australian Research Council Large Grant [T]

  • 1998: $1,167
  • 1997: $48,000

Wang, L. Solving Combinatorial Optimisation Problems using Discrete Time Neural Networks, Australian Research Council Small Grant [T]

  • 1997: $19,414

Garner, B and Sunwoo, J*. An automated (concurrent) software audit for software development process, Australian Research Council SPIRT Grant [T]

  • 2000: $77,487
  • 1999: $151,165

Goscinski, A. Supporting PVM Programmers and Improving Performance of PVM Based Parallel Processing., Australian Research Council Small Grant [T]

  • 1998: $17,000

Goscinski, A and Silcock, J. The Management of Parallel Processes, Data and computational Resources for Applications Using distributed Shared Memory., Australian Research Council Small Grant [T]

  • 1999: $17,000

Yang, Y and Zhou, W. Coordination and Security Mechanisms for Computer-Mediated Teamwork Support in a Web-based Environment., Australian Research Council Small Grant [T]

  • 1998: $10,000

Yang, Y. Visual Programming support for Web-Based Teamwork Modelling., Australian Research Council Small Grant [T]

  • 1999: $10,000

Zhou, W. A Reactive system for Building Fault-Tolerant java Applications, Australian Research Council Small Grant [T]

  • 1998: $10,000

Zhou, W. Towards the Building of Reliable Web-Based Databases., Australian Research Council Small Grant [T]

  • 1999: $14,000

Webb, G. Machine-expert collaborative knowledge acquisition, Australian Research Council Large Grant [T]

  • 1996: $47,286
  • 1995: $46,934

Kloeden, P and Diamond, P*. Numerical Analysis of Dynamical Systems and the Computational Process as a Dynamical System, Australian Research Council Large Grant [T]

  • 1997: $71,280
  • 1996: $68,795
  • 1995: $65,000

Webb, G, Pazzani, M* and Zheng, Z*. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2000: $56,971

Goscinski, A. The Improvement of Execution Performance of Parallel Applications and Utilisation of a Cluster of Workstations Using Global Scheduling, Australian Research Council Small Grant [T]

  • 2000: $16,300

Zhang, C. Coordinating Multi-Agent Systems for Business Process Management Based on Temporal Dependencies, Australian Research Council Small Grant [T]

  • 2000: $16,000

Zhou, W. Managing Replicated Transactions in Web-Based Applications to survive Network Partitioning Failures, Australian Research Council Small Grant [T]

  • 2000: $13,000

Webb, G. Learning efficient accurate Bayesian classifiers from data, Australian Research Council Large Grant [T]

  • 2002: $61,626
  • 2001: $60,281

Goscinski, A, Zhou, B and Brent, R. Job Scheduling Strategies for General-Purpose High Performance Computing Clusters, ARC - Discovery [T]

  • 2004: $70,033
  • 2003: $66,155
  • 2002: $62,322

Zou, L and Hu, E. Removal of Toxic Air Pollutants from car cabin by Photocatalytic Oxidation Reactor, Australian Research Council Linkage APAI [T]

  • 2005: $24,650

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System, Australian Research Council Linkage Project [T]

  • 2005: $24,650
  • 2004: $48,260

Dawson, E*, Batten, L and Simpson, L*. Efficient and Secure Word-Based Stream Ciphers for Wireless Communications, Australian Research Council Discovery Project [T]

  • 2005: $16,666
  • 2004: $16,666

Chen, Y. Australian Centre for Genome-Phenome Bioinformatics, ARC Centre - Centres of Excellence [T]

  • 2009: $54,572
  • 2005: $96,122
  • 2004: $82,000

Chen, Y. Integrating Database Technologies and Visual Analysis, Australian Research Council, Project - Discovery - Projects [T]

  • 2004: $62,961

Chen, Y, Wong, L* and Li, J*. Development of Knowledge Discovery for High Dimensional Biomedical Data, Australian Research Council [T]

  • 2005: $7,147

Goscinski, A, Silcock, J, Hobbs, M and Dew, R. Self Discovery, Self Configuration and Self Healing of Enterprise Grids, Australian Research Council Discovery Project [T]

  • 2005: $82,701

Chen, Y. Exploiting Database Technologies for the Visualization and Analysis of Measured and Simulated Plant Structures in Bioinformatics, Australian Research Council Discovery Project [T]

  • 2005: $51,050

Zhou, S* and Mak, V. Channel Assignment in Cellular Communication Systems and Optical Networks, Australian Research Council Discovery Project [T]

  • 2005: $2,500

Wang, H* and Charnes, C. Private Information Retrieval, Australian Research Council Discovery Project [T]

  • 2005: $10,000

Zhou, W, Shi, W* and Shi, W. Protecting Web Services from Distributed Denial of Service Attacks, ARC Collaborative - Linkage - Projects (Round 2, APAI) [T]

  • 2009: $13,069
  • 2005: $12,325

Zhou, W. Development of methods to address internet crime, ARC Grant - Discovery Projects [T]

  • 2009: $78,568

Research Income - Other Public Sector Funding

Ivanov, A. Visiting fellowship for Professor Alexander Sharkovsky. [U]

  • 1997: $13,950

Hobbs, M. PhD Scholarship - Brendan McKenzie [U]

  • 2005: $8,931
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Warren, M. PhD Scholarship - Warren Brooks [U]

  • 2002: $13,000

Zhou, W. PhD Scholarship - Elicia Lanham [U]

  • 2005: $8,228
  • 2004: $13,863
  • 2003: $13,500
  • 2002: $13,000

Zhou, W. Local Government System [U]

  • 2005: $1,250
  • 2004: $7,500
  • 2003: $1,250

Goscinski, A. PhD Scholarship - Andrew Maloney [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - John Casey [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Zhou, W. PhD Scholarship - Naomi Augar [U]

  • 2005: $14,127
  • 2004: $13,863
  • 2003: $13,500

Batten, L, Doss, R and Palm, B*. Recovery Mechanisms for Wireless Sensor Devices [U]

  • 2009: $18,855

Research Income - Industry and Other Funding

Garner, B. Scholarship Income [V]

  • 2000: $20,000

Batten, L and Castleman, T. Supplier wide eBusiness engagement Project [V]

  • 2003: $25,000
  • 2002: $25,000

Rosenberg, J. BlueJ- The interactive environment [V]

  • 2003: $168,899

Chen, Y. Design and development of a Web-based Intelligent Multimedia Mining System [V]

  • 2004: $5,000
  • 2005: $5,000

Research Income - Industry and Other Funding - Australian

Zhou, W, Shi, W* and Shi, W. Protecting Web Services from Distributed Denial of Service Attacks [V.1]

  • 2005: $6,000

Beliakov, G. Reliable methods of data approximation and forecasting [V.1]

  • 2005: $21,000

Zhou, W and Shi, W. A novel computational approach for identifying transcription factor binding sites in gene promoters [V.1]

  • 2005: $23,000

Chen, Y. Development of data mining tools for the prediction of genomic linked clinical outcomes in a genetic disease state Cystic Fibrosis [V.1]

  • 2005: $18,000

Research Income - Industry and Other Funding - International B (Other Income)

Rosenberg, J. BlueJ- The interactive environment [V.3]

  • 2007: $215,655

Higher Degree by Research Completions

2002 - Doctor of Philosophy

Changgui Chen. Supervisor: Wanlei Zhou
Thesis entitled: A Reactive System Model for Building Fault-Tolerant Distributed Applications.

Thanh-Binh Duong. Supervisor: Lynn Batten
Thesis entitled: Application of Real and Functional Analysis to Solve Boundary Value Problems.

Justin Rough. Supervisor: Andrzej Goscinski
Thesis entitled: A Platform for Reliable Computing on Clusters using Group Communications.

Nicholas Yannios. Supervisor: Lynn Batten
Thesis entitled: Computational Aspects of the Numerical Solution of SDEs.

Shichao Zhang. Supervisor: Cheng-Qi Zhang
Thesis entitled: Knowledge Discovery in Multi-Databases by Analyzing Local Instances.

Zili Zhang. Supervisor: Cheng-Qi Zhang
Thesis entitled: An Agent-Based Hybrid Framework for Decision Making on Complex Problems.

2002 - Master of Science

Paul Sullivan. Supervisor: Jo Coldwell
Thesis entitled: The Evolving Nature of Fraud Investigation and Prevention.

Legend:
* Not a member of Deakin University at time of output.

DRO to publications collection last synchronised: Friday 31st October 2014 10:04pm

Deakin University acknowledges the traditional land owners of present campus sites.

8th November 2010