Argent, RM, Voinov, A, Maxwell, T, Cuddy, SM, Rahman, JM, Seaton, S, Vertessy, RA & Braddock, RD 2006, 'Comparing modelling frameworks – A workshop approach', Environmental Modelling & Software, vol. 21, no. 7, pp. 895-910.
View/Download from: Publisher's site
Bergin, J, Lister, R, Owens, BB & McNally, M 2006, 'The first programming course', ACM SIGCSE Bulletin, vol. 38, no. 3, pp. 301-302.
View/Download from: Publisher's site
View description>>
This panel will discuss ways to engage undergraduates in computing and then to keep them as majors. A special emphasis will be on attracting females to computing. The panelists will discuss the relative strengths and weaknesses of four environments especially designed for the teaching of the first programming course.
Cetindamar, D, Çatay, B & Serdar Basmaci, O 2006, 'Improving the performance of technology partnerships: a case study in the Turkish textile industry', Handbook of Business Strategy, vol. 7, no. 1, pp. 319-323.
View/Download from: Publisher's site
View description>>
PurposeCollaboration is an advantageous strategy for technology‐based competition. Thus, it is of high concern to understand mechanisms behind the success of collaborations such as performance measurement system. This paper will present an empirical study conducted in the Turkish textile industry where performance measures are developed and applied.Design/methodology/approachThe paper utilizes a combination of interviews and surveys to collect data from 3T partners that are six technology supplying and ten dyeing and finishing companies. The findings indicate that besides trust, the existence of a performance measurement system is an extremely important bridge for effective supply chain collaboration (SCC). Such a system should cover metrics related to internal performance, perceptions of partners regarding the alliance performance, and the degree of inter‐firm relationship.FindingsThe paper is based on a technology partnership so the results need to be taken cautiously. However, it is clear that 3T is a successful technological partnership with six new technologies developed in two‐year period. There are some potential improvement areas, particularly in its internal activities and its relationship with the partners. The study shows that as the level of information sharing and communication among the partners increase, the performance and the benefits of the collaboration also increase.Originality/valueSCC can have long‐term goals like continuous product innovation as experienced in 3T and this might increase overall performance of an industry. That is why SCC might be particularly important tool for...
Chin-Teng Lin, Chang-Mao Yeh, Sheng-Fu Liang, Jen-Feng Chung & Kumar, N 2006, 'Support-vector-based fuzzy neural network for pattern classification', IEEE Transactions on Fuzzy Systems, vol. 14, no. 1, pp. 31-41.
View/Download from: Publisher's site
Cole, JH, Devitt, SJ & Hollenberg, LCL 2006, 'Precision characterization of two-qubit Hamiltonians via entanglement mapping', Journal of Physics A: Mathematical and General, vol. 39, no. 47, pp. 14649-14658.
View/Download from: Publisher's site
Coulin, C, Zowghi, D & Sahraoui, A 2006, 'A situational method engineering approach to requirements elicitation workshops in the software development process', Software Process: Improvement and Practice, vol. 11, no. 5, pp. 451-464.
View/Download from: Publisher's site
View description>>
AbstractThe elicitation of requirements for software systems is one of the most critical and complex activities within the development lifecycle. Although the subject has received some degree of attention in the research literature, there remains a need for situational methods and processes that can be easily utilized by the majority of practitioners in typical projects. In this paper we present a flexible yet systematic approach to the early stages of requirements elicitation in software development, based on collaborative workshops and the construction of a lightweight situational method, within a general process framework. The research provides practitioners with an approach to requirements elicitation that can be readily applied to real‐world projects in order to improve both the process and the results. The work also offers researchers an example of how lightweight situational method engineering can be applied to very practical activities and situations in the software process. Copyright © 2006 John Wiley & Sons, Ltd.
Curry, J, McGregor, C & Tracy, S 2006, 'A Communication Tool to Improve the Patient Journey Modeling Process', 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 4726-4730.
View/Download from: Publisher's site
View description>>
Quality improvement is high on the agenda of Health Care Organisations (HCO) worldwide. Patient Journey Modeling is a relatively recent innovation in healthcare quality improvement that models the patient's movement through the HCO by viewing it from a patient centric perspective. Critical to the success of the redesigning care process is the involvement of all stakeholders and their commitment to actively participate in the process. Tools which promote this type of communication are a critical enabler that can significantly affect the overall process redesign outcomes. Such a tool must also be able to incorporate additional factors such as relevant policies and procedures, staff roles, system usage and measurements such as process time and cost. This paper presents a graphically based communication tool that can be used as part of the patient journey modeling process to promote stakeholder involvement, commitment and ownership as well highlighting the relationship of other relevant variables that contribute to the patient's journey. Examples of how the tool has been used and the framework employed are demonstrated via a midwife-led primary care case study. A key contribution of this research is the provision of a graphical communication framework that is simple to use, is easily understood by a diverse range of stakeholders and enables ready recognition of patient journey issues. Results include strong stakeholder buy-in and significant enhancement to the overall design of the future patient journey. Initial results indicate that the use of such a communication tool can improve the patient journey modeling process and the overall quality improvement outcomes. © 2006 IEEE.
Davis, AM & Zowghi, D 2006, 'Good requirements practices are neither necessary nor sufficient', REQUIREMENTS ENGINEERING, vol. 11, no. 1, pp. 1-3.
View/Download from: Publisher's site
Deyrich, M & Dyson, LE 2006, 'Integrating cultural language development with technology in curricular design', International journal of learning, vol. 13, no. 2, pp. 103-112.
Dyson, L & Underwood, J 2006, 'Indigenous People on the Web', Journal of Theoretical and Applied Electronic Commerce Research, vol. 1, no. 1, pp. 65-76.
View/Download from: Publisher's site
View description>>
This paper explores the ways in which Indigenous people around the world are participating in the World Wide Web, through establishing their own websites or accessing services via the Web. Indigenous websites are remarkably diverse: in addition to those representing Indigenous organizations and promoting Indigenous e-commerce, many websites have also been established to further unique concerns of Indigenous communities such as the maintenance and revitalization of Indigenous cultures, intercultural dialogue between Indigenous and non-Indigenous people, political advocacy and mobilization, community rebuilding and social support for disadvantaged communities. Despite the early involvement of Indigenous people on the Web, there still remain many unresolved issues, which include low levels of computer literacy and Internet connectivity, the cost of the technology, low levels of business understanding to support e-commerce, and concerns over the misappropriation of Indigenous knowledge and culture.
Dyson, LE 2006, 'Indigenous Australian cookery, past and present', Journal of Australian Studies, vol. 30, no. 87, pp. 5-18.
View/Download from: Publisher's site
View description>>
It can be claimed that Indigenous Australian cookery is the world's oldest living culinary tradition. How ancient a tradition it can be considered depends on whether one has a scientific or a spiritual worldview. Most anthropologists' estimates of when Aboriginal people first set foot in Australia vary from 45,000 to 55,000 years ago. (1) Many Indigenous Australians, on the other hand, believe that they have been in Australia from time immemorial and therefore their culinary culture also dates ab origine, 'from the beginning'. People, culture and place are inextricably intertwined and bound together as far back in the past as human memory or imagination will reach.
Dyson, LE & Koruth, S 2006, 'Improving business performance through supply chain intelligence: An Australian perspective', ICFAI journal of supply chain management, vol. 3, no. 1, pp. 31-40.
Evelyn Dyson, L & Robertson, T 2006, 'Indigenous Participation in Information Technology Project: Achievements and Challenges of the First Three Years', The Australian Journal of Indigenous Education, vol. 35, no. 1, pp. 11-20.
View/Download from: Publisher's site
View description>>
Abstract In 2002 the Faculty of Information Technology at the University of Technology Sydney began a major initiative to improve the participation of Indigenous Australians in the Information Technology (IT) sector. This followed an initial study which showed that very few Indigenous students undertook studies in IT at university and therefore few found employment as IT professionals. As a result of the new programme, the Faculty’s first Indigenous staff were hired, an Indigenous resource centre was established and the first postgraduate students recruited. In addition, an IT tertiary preparation short course, the Indigenous Pre-IT Program, was launched successfully, the Faculty’s first Indigenous-specific course. With the project, Indigenous student enrolments have increased, mainly as part of the Pre-IT Program and as a result of recruitment of undergraduates from amongst successful Pre-IT Program students. However, retention of undergraduates recruited via special admission provisions has proved difficult despite attempts to secure scholarships and to provide academic support. This paper traces the development of the project and analyses the achievements and challenges in the first three years.
Fincher, S, Lister, R, Pears, A, Sheard, J, Tenenberg, J & Young, A 2006, 'Multi-institutional teaching communities in computer education', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 7-10.
Greentree, AD, Devitt, SJ & Hollenberg, LCL 2006, 'Quantum-information transport to multiple receivers', Physical Review A, vol. 73, no. 3.
View/Download from: Publisher's site
Guo, YG, Zhu, JG & Lu, HY 2006, 'Accurate determination of parameters of a claw-pole motor with SMC stator core by finite-element magnetic-field analysis', IEE Proceedings - Electric Power Applications, vol. 153, no. 4, pp. 568-568.
View/Download from: Publisher's site
View description>>
Effective and accurate prediction of key motor parameters, such as winding flux, back electromotive force, inductance and core losses, is crucial for design of high-performance motors. Particularly, for electrical machines with new materials and nonconve
Hussain, OK, Chang, E, Hussain, FK & Dillon, TS 2006, 'A methodology for Risk measurement in e-transactions', COMPUTER SYSTEMS SCIENCE AND ENGINEERING, vol. 21, no. 1, pp. 17-31.
View description>>
Risk is present in almost every activity. Alternately speaking, almost every activity may have some undesired outcomes which the person doing the activity hopes that they do not occur when it undertakes that particular activity. The quantification of tho
Kay, R & Dyson, L 2006, 'Learning to Collaborate and Collaborating to Learn: An Experiential Approach to Teaching Collaborative Systems', Journal of Theoretical and Applied Electronic Commerce Research, vol. 1, no. 2, pp. 36-44.
View/Download from: Publisher's site
View description>>
This paper describes the use of experiential learning theory in the development of an undergraduate subject in collaborative systems. The purpose of the subject was to introduce students to the design, development and use of collaborative systems in organizational environments. Early in the subject’s development it was decided that in order for students to gain a deeper understanding of the issues involved in the development of collaborative systems, they should collaborate using an e-learning system so that they could experience these problems first hand. The paper provides an overview of the subject structure, the views of students with regard to the learning approach and some of the outcomes that were observed. The findings revealed that the experiential approach was successful in providing students with a good understanding of the issues associated with the design and use of collaborative systems. However, while many achieved deeper learning outcomes than would normally be provided by a traditional didactic approach, there were students who failed to achieve the desired learning levels. The findings not only provide support for Perry’s model of intellectual development and the value of setting unstructured problems, but also demonstrate the need for structure in early experiential events to which students are exposed.
Kazienko, P & Musiał, K 2006, 'Recommendation Framework for Online Social Networks', ADVANCES IN WEB INTELLIGENCE AND DATA MINING, vol. 23, pp. 111-120.
View/Download from: Publisher's site
Kutay, C & Lister, R 2006, 'Up close and pedagogical: Computing academics talk about teaching', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 125-134.
View description>>
This paper describes and enacts a process for bootstrapping a more systematic discussion of computing education within a school of computing at a researchintensive Australasian university. Thus far, the project has gone through three stages. In the first stage, some academics were interviewed about their approach to teaching. In the second stage, selected anonymous quotes from the interviews were presented and discussed by other interested members of the school at workshops. In the final stage, selected anonymous quotes from the interviews and workshops were placed on a web-based survey, to which interested members of the school responded. These forms of data will be used to drive further stages of debate within the school. The theoretical underpinnings of this project are Wenger's concept of a community of practice, phenomenography, and socially constructivism. The aim is not to instruct the academics in any 'right way' to teach. Instead, the aim is to facilitate debate, where the teachers identify the problems, and in finding the solutions they construct their own 'pedagogic reality'. As facilitators of this process, the authors of this paper highlighted dialectically opposed views in quotes from the teachers, and then allow the teachers to synthesise those views into a more sophisticated view. Our ultimate project aim is to grow a teaching community that balances reified theories of teaching and learning with participation in a community of practice. © 2006, Australian Computer Society, Inc.
Lee, MJW & Chan, A 2006, 'Exploring the potential of podcasting to deliver mobile ubiquitous learning in higher education', Journal of Computing in Higher Education, vol. 18, no. 1, pp. 94-115.
View/Download from: Publisher's site
View description>>
This paper addresses one of the main barriers to the widespread adoption of mobile learning in higher education, that of cost. Usage charges billed by telecommunications providers and the cost of mobile hardware are identified as the key cost issues. However, opportunities to overcome this barrier include the high rate of ownership of mobile phones by university students and technological solutions such as packet transmission technologies. The authors describe two experiments in low-cost mobile learning: one that uses packet technology (mobile WAP/WML) to build low-cost interactivity in the classroom and the second that involves mobile-supported fieldwork using several cost-saving strategies
Li, J & Hao, P-W 2006, 'Smooth interpolation on homogeneous matrix groups for computer animation', Journal of Zhejiang University-SCIENCE A, vol. 7, no. 7, pp. 1168-1177.
View/Download from: Publisher's site
Lin, C-T, Ko, L-W, Chung, I-F, Huang, T-Y, Chen, Y-C, Jung, T-P & Liang, S-F 2006, 'Adaptive EEG-Based Alertness Estimation System by Using ICA-Based Fuzzy Neural Networks', IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 53, no. 11, pp. 2469-2476.
View/Download from: Publisher's site
Lister, R 2006, 'Call me Ishmael', ACM SIGCSE Bulletin, vol. 38, no. 2, pp. 11-13.
View/Download from: Publisher's site
View description>>
It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light, it was the season of Darkness, it was the spring of hope, it was the winter of despair, we had everything before us, we had nothing before us ...[2].
Lister, R 2006, 'One room, four meetings', ACM SIGCSE Bulletin, vol. 38, no. 4, pp. 11-13.
View/Download from: Publisher's site
View description>>
Over the last couple of years, I have attended regular meetings with a group of colleagues who share my interest in computer education. After two years, I've realized that my colleagues and I are all in the same room, at the same time, but there are four different meetings going on at once. Only one of the meetings is about education research. As an education researcher, I often find the other meetings frustrating, but I have also come to see that there are positives to all four types of meetings. Each meeting has its weaknesses, including the research meeting, and these respective weaknesses are ameliorated by the other meeting types.
Lister, R, Berglund, A, Clear, T, Bergin, J, Garvin-Doxas, K, Hanks, B, Hitchner, L, Luxton-Reilly, A, Sanders, K, Schulte, C & Whalley, JL 2006, 'Research perspectives on the objects-early debate', ACM SIGCSE Bulletin, vol. 38, no. 4, pp. 146-165.
View/Download from: Publisher's site
View description>>
In March 2004, SIGCSE members contributed to a mailing list discussion on the question of whether programming should be taught objects first or imperative first. We analyse that discussion, exploring how the CS community debates the issue and whether contributors' positions are supported by the research literature on novice programmers. We applied four distinct research methods to the discussion: cognitive science, rhetorical analysis in the critical tradition, phenomenography and biography. We identify the cognitive claims made in the email discussion and find there is not a consensus in the research literature as to whether the objects first approach or the imperative approach is harder to learn. From the rhetorical analysis, we find that the discussion was not so much a debate between OO-first versus imperative-first, but instead was more for and against OO-first. Our phenomenographic analysis identified and categorized the underlying complexity of the discussion. We also applied a biographical method to explore the extent to which the participants' views are shaped by their own prior experience. The paper concludes with some reflections upon paradigms, and the manner in which the CS discipline community defines itself.
Lister, R, Schulte, C, Whalley, JL, Berglund, A, Clear, T, Bergin, J, Garvin-Doxas, K, Hanks, B, Hitchner, L, Luxton-Reilly, A & Sanders, K 2006, 'Research perspectives on the objects-early debate', Working group reports on ITiCSE on Innovation and technology in computer science education - ITiCSE-WGR '06, vol. 38, no. 4, pp. 146-165.
View/Download from: Publisher's site
Lister, R, Simon, B, Thompson, E, Whalley, JL & Prasad, C 2006, 'Not seeing the forest for the trees', ACM SIGCSE Bulletin, vol. 38, no. 3, pp. 118-122.
View/Download from: Publisher's site
View description>>
This paper reports on the authors use of the SOLO taxonomy to describe differences in the way students and educators solve small code reading exercises. SOLO is a general educational taxonomy, and has not previously been applied to the study of how novice programmers manifest their understanding of code. Data was collected in the form of written and think-aloud responses from students (novices) and educators (experts), using exam questions. During analysis, the responses were mapped to the different levels of the SOLO taxonomy. From think-aloud responses, the authors found that educators tended to manifest a SOLO relational response on small reading problems, whereas students tended to manifest a multistructural response. These results are consistent with the literature on the psychology of programming, but the work in this paper extends on these findings by analyzing the design of exam questions.
Lu, J, Shi, C & Zhang, G 2006, 'On bilevel multi-follower decision making: General framework and solutions', INFORMATION SCIENCES, vol. 176, no. 11, pp. 1607-1627.
View/Download from: Publisher's site
View description>>
Within the framework of any bilevel decision problem, a leader's decision is influenced by the reaction of his or her follower. When multiple followers who may have had a share in decision variables, objectives and constraints are involved in a bilevel decision problem, the leader's decision will be affected, not only by the reactions of these followers, but also by the relationships among these followers. This paper firstly identifies nine different kinds of relationships (S1 to S9) amongst followers by establishing a general framework for bilevel multi-follower decision problems. For each of the nine a corresponding bilevel multi-follower decision model is then developed. Also, this paper particularly proposes related theories focusing on an uncooperative decision problem (i.e., S1 model), as this model is the most basic one for bilevel multi-follower decision problems over the nine kinds of relationships. Moreover, this paper extends the Kuhn-Tucker approach for driving an optimal solution from the uncooperative decision model. Finally, a real case study of a road network problem illustrates the application of the uncooperative bilevel decision model and the proposed extended Kuhn-Tucker approach. © 2005 Elsevier Inc. All rights reserved.
McGregor, C, Schiefer, J & Muehlen, MZ 2006, 'A shareable web service-based intelligent decision support system for on-demand business process management', International Journal of Business Process Integration and Management, vol. 1, no. 3, pp. 156-156.
View/Download from: Publisher's site
View description>>
The monitoring of business processes for performance measurement is challenged by the variety of inter and intra organisational units and information systems involved in the execution of these processes. In this paper we present a shareable, web service-based Intelligent Decision Support System (IDSS) for on-demand business process management, that we call the Solution Manager Service (SMS). The SMS allows organisations to outsource the collection, accumulation and transformation of information about their business processes from multiple distributed systems across multiple organisations in a centralised repository and share them among authorised parties, such as supply chain partners, clients or government agencies. Copyright © 2006 Inderscience Enterprises Ltd.
Moiseenko, TI, Voinov, AA, Megorsky, VV, Gashkina, NA, Kudriavtseva, LP, Vandish, OI, Sharov, AN, Sharova, Y & Koroleva, IN 2006, 'Ecosystem and human health assessment to define environmental management strategies: The case of long-term human impacts on an Arctic lake', Science of The Total Environment, vol. 369, no. 1-3, pp. 1-20.
View/Download from: Publisher's site
Niazi, M, Wilson, D & Zowghi, D 2006, 'Critical success factors for software process improvement implementation: an empirical study', Software Process: Improvement and Practice, vol. 11, no. 2, pp. 193-211.
View/Download from: Publisher's site
View description>>
AbstractIn this article, we present findings from our recent empirical study of the critical success factors (CSFs) for software process improvement (SPI) implementation with 34 SPI practitioners. The objective of this study is to provide SPI practitioners with sufficient knowledge about the nature of issues that play a positive role in the implementation of SPI programmes in order to assist them in effectively planning SPI implementation strategies.Through our empirical study we identified seven factors (higher management support, training, awareness, allocation of resources, staff involvement, experienced staff and defined SPI implementation methodology) that are generally considered critical for successfully implementing SPI. We also report on a literature survey of CSFs that impact SPI and identify six factors (senior management commitment, staff involvement, staff time and resources, training and mentoring, creating process action teams and reviews). We compared our empirical study results with the literature and confirmed the factors identified in the literature, and also identified two new CSFs (SPI awareness and defined SPI implementation methodology) that were not identified in the literature. Finally, we analyzed the CSFs identified by different groups of practitioners and found that they are aware of what is imperative for the successful implementation of SPI programmes. Copyright © 2006 John Wiley & Sons, Ltd.
Oi, DKL, Devitt, SJ & Hollenberg, LCL 2006, 'Scalable Error Correction in Distributed Ion Trap Computers', Phys. Rev. A., vol. 74, no. 5, p. 052313.
View/Download from: Publisher's site
View description>>
A major challenge for quantum computation in ion trap systems is scalableintegration of error correction and fault tolerance. We analyze a distributedarchitecture with rapid high fidelity local control within nodes and entangledlinks between nodes alleviating long-distance transport. We demonstratefault-tolerant operator measurements which are used for error correction andnon-local gates. This scheme is readily applied to linear ion traps whichcannot be scaled up beyond a few ions per individual trap but which have accessto a probabilistic entanglement mechanism. A proof-of-concept system ispresented which is within the reach of current experiment.
RIZZO, D, MOUSER, P, WHITNEY, D, MARK, C, MAGAREY, R & VOINOV, A 2006, 'The comparison of four dynamic systems-based software packages: Translation and sensitivity analysis', Environmental Modelling & Software, vol. 21, no. 10, pp. 1491-1502.
View/Download from: Publisher's site
Shi, C, Lu, J, Zhang, G & Zhou, H 2006, 'An extended branch and bound algorithm for linear bilevel programming', APPLIED MATHEMATICS AND COMPUTATION, vol. 180, no. 2, pp. 529-537.
View/Download from: Publisher's site
View description>>
For linear bilevel programming, the branch and bound algorithm is the most successful algorithm to deal with the complementary constraints arising from Kuhn-Tucker conditions. However, one principle challenge is that it could not well handle a linear bilevel programming problem when the constraint functions at the upper-level are of arbitrary linear form. This paper proposes an extended branch and bound algorithm to solve this problem. The results have demonstrated that the extended branch and bound algorithm can solve a wider class of linear bilevel problems can than current capabilities permit. © 2006 Elsevier Inc. All rights reserved.
Simon, Fincher, S, Robins, A, Baker, B, Cutts, Q, Haden, P, Hamilton, M, Petre, M, Tolhurst, D, Box, I, de Raadt, M, Hamer, J, Lister, R, Sutton, K & Tutty, J 2006, 'Predictors of success in a first programming course', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 189-196.
View description>>
This paper describes a multi-national, multi-institutional study that investigated introductory programming courses .. Student participants were drawn from eleven institutions, mainly in Australasia, during the academic year of 2004. A number of diagnostic tasks were used to explore cognitive, behavioural, and attitudinal factors such as spatial visualisation and reasoning, the ability to articulate strategies for commonplace search and design tasks, and attitudes to studying. The results indicate that a deep approach to learning was positively correlated with mark for the course, while a surface approach was negatively correlated; spatial visualisation skills are correlated with success; a progression of map drawing styles identified in the literature has a significant correlation with marks; and increasing measures of richness of articulation of a search strategy are also associated with higher marks. Finally, a qualitative analysis of short interviews identified the qualities that students themselves regarded as important to success in programming. © 2006, Australian Computer Society, Inc.
Sood, SC & Pattinson, HM 2006, 'Urban renewal in Asia-Pacific: A comparative analysis of brainports for Sydney and Kuala Lumpur', Journal of Business Research, vol. 59, no. 6, pp. 701-708.
View/Download from: Publisher's site
View description>>
This paper reviews the concept of brainports and application to a South-East Asian context. The brainport concept is relevant for analysing transformation of an existing physical and information infrastructure, but a key finding of the research project i
Tolhurst, D, Baker, B, Hamer, J, Box, I, Cutts, Q, de Raadt, M, Fincher, S, Haden, P, Hamilton, M, Lister, R, Petre, M, Robins, A, Simon, Sutton, K & Tutty, J 2006, 'Do map drawing styles of novice programmers predict success in programming? A multi-national, multi-institutional study', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 213-222.
View description>>
In this paper, we present the results of one aspect of a multinational, multi-institutional study of computer programming students. Specifically, this paper reports on an exploration of relationships between novice programmers' map-drawing styles (landmark, route or survey) and success in a first programming course at tertiary level. Relationships were found between map-drawing style and success of students in introductory programming courses, but there were mediating factors that resulted in some mixed findings between the countries in which data was collected. The results of this study identify some rich areas for further exploration, and suggests how this line of research might progress. © 2006, Australian Computer Society, Inc.
Whalley, JL, Lister, R, Thompson, E, Clear, T, Robbins, P, Ajith Kumar, PK & Prasad, C 2006, 'An Australasian study of reading and comprehension skills in novice programmers, using the bloom and SOLO taxonomies', Conferences in Research and Practice in Information Technology Series, vol. 52, no. 5, pp. 243-252.
View description>>
In this paper we report on a multi-institutional investigation into the reading and comprehension skills of novice programmers. This work extends previous studies (Lister 2004, McCracken 2001) by developing a question set within two key pedagogical frameworks: the Bloom and SOLO taxonomies. From this framework of analysis some interesting emergent patterns relating the cognitive level of the questions to student performance have been identified. © 2006, Australian Computer Society, Inc.
Wu, FJ, Lu, J & Zhang, GQ 2006, 'A new approximate algorithm for solving multiple objective linear programming problems with fuzzy parameters', APPLIED MATHEMATICS AND COMPUTATION, vol. 174, no. 1, pp. 524-544.
View/Download from: Publisher's site
View description>>
Many business decision problems involve multiple objectives and can thus be described by multiple objective linear programming (MOLP) models. When a MOLP problem is being formulated, the parameters of objective functions and constraints are normally assigned by experts. In most real situations, the possible values of these parameters are imprecisely or ambiguously known to the experts. Therefore, it would be more appropriate for these parameters to be represented as fuzzy numerical data that can be represented by fuzzy numbers. In this paper, a new approximate algorithm is developed for solving fuzzy multiple objective linear programming (FMOLP) problems involving fuzzy parameters in any form of membership functions in both objective functions and constraints. A detailed description and analysis of the algorithm are supplied. In addition, an example is given to illustrate the approximate algorithm. © 2005 Elsevier Inc. All rights reserved.
Al-Oqaily, A & Kennedy, PJ 1970, 'Using a kernel-based approach to visualize integrated Chronic Fatigue Syndrome datasets', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, ACS, Sydney Australia, pp. 53-61.
View description>>
We describe the use of a kernel-based approach using the Laplacian matrix to visualize an integrated Chronic Fatigue Syndrome dataset comprising symptom and fatigue questionnaire and patient classification data, complete blood evaluation data and patient gene expression profiles. We present visualizations of the individual and integrated datasets with the linear and Gaussian kernel functions. An efficient approach inspired by computational linguistics for constructing a linear kernel matrix for the gene expression data is described. Visualizations of the questionnaire data show a cluster of non-fatigued individuals distinct from those suffering from Chronic Fatigue Syndrome that supports the fact that diagnosis is generally made using this kind of data. Clusters unrelated to patient classes were found in the gene expression data. Structure from the gene expression dataset dominated visualizations of integrated datasets that included gene expression data. © 2006, Australian Computer Society, Inc.
Azadeh, A, Ghaderi, SF, Tarverdian, S & Saberi, M 1970, 'Integration of Artificial Neural Networks and Genetic Algorithm to Predict Electrical Energy consumption', IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, IEEE, pp. 2552-2557.
View/Download from: Publisher's site
View description>>
This study presents an integrated genetic algorithm (GA) and artificial neural network (ANN) to estimate and predict electricity demand using stochastic procedures. The economic indicators used in this paper are price, value added, number of customers and consumption in the previous periods. This model can be used to estimate energy demand in the future by optimizing parameter values. The GA applied in this study has been tuned for all its parameters and the best coefficients with minimum error are identified, while all parameter values are tested concurrently. The estimation errors of genetic algorithm model are less than that of estimated by regression method. Neural network is used to forecast each independent variable and then electricity consumption is forecasted up to year 2008.It is shown that neural networks dominate time series approach form the point of yielding less Mean Absolute Percentage Error (MAPE) error.. In addition, another unique feature of this study is utilization of ANN instead of time series to obtain better predictions for energy consumption. Electricity consumption in Iranian agriculture sector from 1981 to 2005 is considered as the case of this study. © 2006 IEEE.
Azadeh, A, Ghaderi, SF, Tarverdian, S & Saberi, M 1970, 'Integration of artificial neural networks and genetic algorithm to predict electrical energy consumption', IECON 2006 - 32ND ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS, VOLS 1-11, 32nd Annual Conference of the IEEE-Industrial-Electronics-Society, IEEE, Paris, FRANCE, pp. 4834-+.
Azadeh, A, Moghadam, RT, Ghaderi, SF, Tarverdian, S & Saberi, M 1970, 'Integration of Artificial Neural Networks and Genetic Algorithm to Predict Electrical Energy Consumption in Energy Intensive Sector', 2006 1ST IEEE International Conference on E-Learning in Industrial Electronics, 2006 1ST IEEE International Conference on E-Learning in Industrial Electronics, IEEE, Hammamet, TUNISIA, pp. 58-+.
View/Download from: Publisher's site
Azadeh, MA, Ghaderi, SF, Anvari, M & Saberi, M 1970, 'Measuring performance electric power generations using artificial neural networks', 2006 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-6, IEEE International Conference on Industrial Technology, IEEE, INDIA, Bombay, pp. 379-+.
Azadeh, MA, Ghaderi, SF, Anvari, M & Saberi, M 1970, 'Measuring Performance Electric Power Generations Using Artificial Neural Networks', 2006 IEEE International Conference on Industrial Technology, 2006 IEEE International Conference on Industrial Technology, IEEE, pp. 7-12.
View/Download from: Publisher's site
View description>>
efficiency frontier analysis has been an important approach of evaluating firms' performance in private and public sectors. There have been many efficiency frontier analysis methods reported in the literature. However, the assumptions made for each of these methods are restrictive. Each of these methodologies has its strength as well as major limitations. This study proposes a non-parametric efficiency frontier analysis method based on the adaptive neural network technique for measuring efficiency as a complementary tool for the common techniques of the efficiency studies in the previous studies. The proposed computational method is able to find a stochastic frontier based on a set of input-output observational data and do not require explicit assumptions about the function structure of the stochastic frontier. In this algorithm, for calculating the efficiency scores, a similar approach to econometric methods has been used. Moreover, the effect of the return to scale of decision making unit (DMU) on its efficiency is included and the unit used for the correction is selected by notice of its scale (under constant return to scale assumption). An example using real data is presented for illustrative purposes, in the application to the power generation sector of Iran, we find that the neural network provide more robust results and identifies more efficient units than the conventional methods since better performance patterns are explored. Moreover, principle component analysis (PCA) and numerical taxonomy (NT) are used to verify the findings of the purposed algorithm.
Azadeh, MA, Ghaderi, SF, Anvari, M & Saberi, M 1970, 'Measuring performance electric power generations using artificial neural networks and fuzzy clustering', IECON 2006 - 32ND ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS, VOLS 1-11, 32nd Annual Conference of the IEEE-Industrial-Electronics-Society, IEEE, FRANCE, Paris, pp. 4595-+.
Azadeh, MA, Ghaderi, SF, Anvari, M & Saberi, M 1970, 'Measuring Performance Electric Power Generations Using Artificial Neural Networks and Fuzzy Clustering', IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics, IEEE, pp. 4761-4766.
View/Download from: Publisher's site
View description>>
Efficiency frontier analysis has been an important approach of evaluating firms' performance in private and public sectors. There have been many efficiency frontier analysis methods reported in the literature. However, the assumptions made for each of these methods are restrictive. Each of these methodologies has its strength as well as major limitations. This study proposes a non-parametric efficiency frontier analysis method based on the adaptive neural network technique for measuring efficiency as a complementary tool for the common techniques of the efficiency studies in the previous studies. The proposed computational methods are able to find a stochastic frontier based on a set of input-output observational data and do not require explicit assumptions about the function structure of the stochastic frontier. In purposed algorithm, for calculating the efficiency scores, a similar approach to econometric methods has been used and the effect of the scale of decision making unit (DMU) on its efficiency is included and the unit used for the correction is selected by notice of its scale. For increasing homogeneousness, the algorithm is proposed that use Fuzzy C-means method to cluster DMUs. An example using real data is presented for illustrative purposes. In the application to the power generation sector of Iran, we find that the neural network provide more robust results to rank decision making units than the conventional methods. © 2006 IEEE.
Azadeh, MA, Ghaderi, SF, Guitiforooz, A & Saberi, M 1970, 'Improved Estimation of Electricity Demand Function by Integration of Fuzzy System and Data Mining Approach', 2006 IEEE International Conference on Industrial Technology, 2006 IEEE International Conference on Industrial Technology, IEEE, pp. 2160-2165.
View/Download from: Publisher's site
View description>>
This paper presents an integrated fuzzy system and data mining approach for estimation of electricity demand function in Iran. To construct fuzzy systems, a rule base is needed. Because a rule base is not available, for the case of demand function, look up table which is one of the extracting rule methods is used to extract the rule base. But the extraction by look up table in this case (demand function) operates poorly. Therefore, decision tree method which is a data mining approach is utilized to extract the rule base. It can be seen that this method provides better solution. The case study is based on the total electricity consumption in Iran from 1992 to 2004. The prescribed approach may be an ideal substitute for fuzzy regression. At last, relative results of the mentioned methods are compared with ARIMA (Auto Regressive Integrated Moving Average) model, which is one of the most famous time series models.
Azadeh, MA, Ghaderi, SF, Guitiforooz, A & Saberi, M 1970, 'Improved estimation of electricity demand function by integration of fuzzy system and data mining approach', 2006 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY, VOLS 1-6, IEEE International Conference on Industrial Technology, IEEE, Bombay, INDIA, pp. 2742-+.
Bachfischer, A, Lawrence, EM, Culjak, G & Prior, JR 1970, 'Online Teaching of large Groups in Information Technology: a survey of strategies', Proceedings of IADIS Internatoinal Conference e-Society 2006, IADIS International Conference e-Society, IADIS Press, Dublin, Ireland, pp. 201-209.
Beauregard, M & Kennedy, PJ 1970, 'Robust Simulation of Lamprey Tracking', Parallel problem solving from nature - PPSN, Parallel Problem Solving from Nature, Springer Berlin Heidelberg, Rejkavik, Iceland, pp. 641-650.
View/Download from: Publisher's site
View description>>
Biologically realistic computer simulation of vertebrates is a challenging problem with exciting applications in computer graphics and robotics. Once the mechanics of locomotion are available it is interesting to mediate this locomotion with higher level behavior such as target tracking. One recent approach simulates a relatively simple vertebrate, the lamprey, using recurrent neural networks to model the central pattern generator of the spine and a physical model for the body. Target tracking behavior has also been implemented for such a model. However, previous approaches suffer from deficiencies where particular orientations of the body to the target cause the central pattern generator to shutdown. This paper describes an approach to making target tracking more robust.
Beauregard, M, Kennedy, PJ & Debenham, J 1970, 'Fast simulation of animal locomotion: lamprey swimming', IFIP Advances in Information and Communication Technology, World Computer Congress, Springer US, Santiago, Chile, pp. 247-256.
View/Download from: Publisher's site
View description>>
© 2006 by International Federation for Information Processing. All rights reserved. Biologically realistic computer simulation of vertebrate locomotion is an interesting and challenging problem with applications in computer graphics and robotics. One current approach simulates a relatively simple vertebrate, the lamprey, using recurrent neural networks for the spine and a physical model for the body. The model is realized as a system of differential equations. The drawback with this approach is the slow speed of simulation. This paper describes two approaches to speeding up simulation of lamprey locomotion without sacrificing too much biological realism: (i) use of superior numerical integration algorithms and (ii) simplifications to the neural architecture of the lamprey.
Bergin, J, Lister, R, Owens, BB & McNally, M 1970, 'The first programming course', Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, ITiCSE06: 11th Annual Conference on Innovation and Technology in Computer Science Education, ACM, pp. 301-302.
View/Download from: Publisher's site
View description>>
This panel will discuss ways to engage undergraduates in computing and then to keep them as majors. A special emphasis will be on attracting females to computing. The panelists will discuss the relative strengths and weaknesses of four environments especially designed for the teaching of the first programming course.
Cetindamar, D, Can, O & Pala, O 1970, 'Technology Management Activities and Tools: The Practice in Turkey', 2006 Technology Management for the Global Future - PICMET 2006 Conference, 2006 Technology Management for the Global Future - PICMET 2006 Conference, IEEE, pp. 92-98.
View/Download from: Publisher's site
View description>>
The diffusion of management techniques is as difficult as the diffusion of technologies. This paper aims to find out how technology management is perceived and utilized in Turkish firms. The research is based on a survey that consists of 89 company responses out of the biggest 500 firms in the Turkish industry. The investigation consists of 1) the degree of diffusion in terms of technology management activities such as technology planning as well as 2) the techniques and tools used in technology management such as simulation. The literature review indicates 11 technology management activities ranging from strategy to utilization and 36 technology management techniques / tools. The results show that Turkish managers try to utilize technologies rather than creating them and they use 11 techniques more often than others and many important tools such as technology life cycle are not diffused yet. The paper ends with a discussion of findings. (c) 2006 PICMET.
Chen, L, Bhowmick, SS & Li, J 1970, 'COWES: Clustering Web Users Based on Historical Web Sessions', DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, PROCEEDINGS, 11th International Conference on Database Systems for Advanced Applications, Springer Berlin Heidelberg, Singapore, SINGAPORE, pp. 541-556.
View/Download from: Publisher's site
Chen, L, Bhowmick, SS & Li, J 1970, 'Mining Temporal Indirect Associations', ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer Berlin Heidelberg, Singapore, SINGAPORE, pp. 425-434.
View/Download from: Publisher's site
Christen, P, Kennedy, PJ, Li, J, Simoff, SJ & Williams, G 1970, 'Data Mining 2006: Proceedings of the Australasian Data Mining Conference (AusDM 2006)', Data Mining 2006: Proceedings of the Australasian Data Mining Conference (AusDM 2006), Australian Data Mining Conference, Australian Computer Society, Sydney.
Christen, P, Kennedy, PJ, Li, J, Simoff, SJ & Williams, GJ 1970, 'Preface', Conferences in Research and Practice in Information Technology Series.
Curry, J, McGregor, C, Tracy, S & IEEE 1970, 'A communication tool to improve the patient journey modeling process', 2006 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Vols 1-15, 28th Annual International Conference of the IEEE-Engineering-in-Medicine-and-Biology-Society, IEEE, New York, NY, pp. 901-905.
Doyle, BJ & Lister, RF 1970, 'Apreliminary phenomenographic study concerning student experiences of UNIX', Proceedings of the 19th annual conference of the national advisory comittee on computing qualifications, National Advisory Committee on Computing Qualifications, National advisory comittee on computing qualifications, Wellington, pp. 73-78.
Dyson, LE & Leggett, MG 1970, 'Towards a metadesign approach for building indigenous multimedia cultural archives', Proceedings of the 12th ANZSYS Conference, Sustaining Our Social and Natural Capital, Annual ANZSYS conference, ISCE Publishing, Katoomba, Australia, pp. 82-87.
Dyson, LE, Salazar, F, Hendriks, M, Underwood, J & Kay, RJ 1970, 'ICTS for intercultural dialogue: an overview of UNESCO's indigenous communication project', Cultural attitudes towards technology and communication, Cultural Attitudes towards Technology and Communications, Murdoch University, Tartu, Estonia, pp. 340-359.
Gill, AQ & Henderson-Sellers, B 1970, 'Measuring agility and adaptibility of agile methods: A 4 dimensional analytical tool', Proceedings of the IADIS international conference on applied computing 2006, The IADIS international conference on applied computing 2006, IADIS Press, San Sebastian Spain, pp. 503-507.
Goyal, M, Lu, J & Zhang, G 1970, 'A novel fuzzy attitude based bidding strategy for multi-attribute auction', 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, Workshops Proceedings, IEEE/WIC/ACM international Conference on Web Intelligence and Intelligent Agent Technology, Conference publicity services, Hong Kong, China, pp. 535-539.
View/Download from: Publisher's site
View description>>
Auctions have recently commanded a lot of attention in the field of multi-agent systems. To be successful in open multi-attribute auctions, agents must be capable of adapting different strategies and tactics to their prevailing circumstances. This paper presents a software test-bed for studying autonomous bidding strategies in simulated auctions for procuring goods. It shows that agents' bidding strategy explore the attitudes and behaviors that help agents to manage dynamic assessment of alternative prices of goods given the different scenario conditions. Our agent also uses fuzzy techniques for the decision making: to make decisions about the outcome of auctions, and to alter the agent's bidding strategy in response to the different criteria and market conditions
Guo, Y, Chen, J, Zhu, J, Lu, H, Lu, H & Jin, J 1970, 'An Improved Phase Variable Model for Dynamic Performance Analysis of a PM Claw Pole SMC Motor with Brushless DC Control', Proceedings of the Australasian Universities Power Engineering Conference, Australasian Universities Power Engineering Conference, Victoria University, Melbourne, Australia, pp. 1-6.
Guo, Y, Jin, J, Zhu, J & Lu, H 1970, 'Design and Performance Evaluation of a PM Linear Synchronous Motor for Maglev Transportation', Proceedings of the Australasian Universities Power Engineering, Australasian Universities Power Engineering Conference, Victoria, University, Melbourne, Australia, pp. 1-5.
Guo, YG, Zhu, JG, Lin, ZW, Zhong, JJ, Lu, HY & Wang, SH 1970, '3D Magnetic Reluctivity Tensor of Soft Magnetic Composite Material', 2006 12th Biennial IEEE Conference on Electromagnetic Field Computation, 2006 12th Biennial IEEE Conference on Electromagnetic Field Computation, IEEE, p. 91.
View/Download from: Publisher's site
View description>>
Soft magnetic composite (SMC) materials are particularly suitable for construction of electrical machines with complex structure and 3D magnetic flux. For design and analysis of such 3D flux machines, 3D magnetic properties of the magnetic materials should be properly determined, modeled and applied for calculating the magnetic field distribution, parameters and performance. This paper presents the 3D magnetic property measurement and determination of 3D reluctivity tensor of SMC. The reluctivity tensor is a key factor for the numerical analysis of magnetic field in a 3D flux SMC motor. ©2006 IEEE.
Guoli Zhang, Hai Yan Lu, Gengyin Li & Hong Xie 1970, 'A New Hybrid Real-Coded Genetic Algorithm and Application in Dynamic Economic Dispatch', 2006 6th World Congress on Intelligent Control and Automation, 2006 6th World Congress on Intelligent Control and Automation, IEEE, Dalian, China, pp. 3627-3631.
View/Download from: Publisher's site
Han, D, Xiao, C, Zhou, R, Wang, G, Huo, H & Hui, X 1970, 'Load Shedding for Window Joins over Streams', Springer Berlin Heidelberg, pp. 472-483.
View/Download from: Publisher's site
Hao, Z, Wen, W, Yang, X, Lu, J & Zhang, G 1970, 'A fast data preprocessing procedure for support vector regression', INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2006, PROCEEDINGS, International Conference on Intelligent Data Engineering and Automated Learning, Springer-Verlag, BURJOS, Spain, pp. 48-56.
View/Download from: Publisher's site
View description>>
A fast data preprocessing procedure (FDPP) for support vector regression (SVR) is proposed in this paper. In the presented method, the dataset is firstly divided into several subsets and then K-means clustering is implemented in each subset. The clusters are classified by their group size. The centroids with small group size are eliminated and the rest centroids are used for SVR training. The relationships between the group sizes and the noisy clusters are discussed and simulations are also given. Results show that FDPP cleans most of the noises, preserves the useful statistical information and reduces the training samples. Most importantly, FDPP runs very fast and maintains the good regression performance of SVR.
Hollenberg, LCL, Greentree, AD, Wellard, CJ, Fowler, AG, Devitt, SJ & Cole, JH 1970, 'Qubit Transport and Fault-tolerant Architectures in Silicon', 2006 INTERNATIONAL CONFERENCE ON NANOSCIENCE AND NANOTECHNOLOGY, VOLS 1 AND 2, International Conference on Nanoscience and Nanotechnology, IEEE, AUSTRALIA, Brisbane, pp. 655-+.
Hollenberg, LCL, Greentree, AD, Wellard, CJ, Fowler, AG, Devitt, SJ & Cole, JH 1970, 'Qubit Transport and Fault-tolerant Architectures in Silicon', 2006 International Conference on Nanoscience and Nanotechnology, 2006 International Conference on Nanoscience and Nanotechnology, IEEE, pp. 348-350.
View/Download from: Publisher's site
View description>>
We review a new adiabatic scheme - coherent spin transport by adiabatic passage (CSTAP) - for physical qubit transport particularly suited to atomic and solid-state systems. Several applications immediately follow, including a 2D Si:P donor electron spin architecture for quantum computing, and protocols for generating entangled states across non-local qubits. © 2006 IEEE.
Hsieh, H-Y, Liang, S-F, Ko, L-W, Lin, M & Lin, C-T 1970, 'Development of a Real-Time Wireless Embedded Brain Signal Acquisition/Processing System and its Application on Driver's Drowsiness Estimation', 2006 IEEE International Conference on Systems, Man and Cybernetics, 2006 IEEE International Conference on Systems, Man and Cybernetics, IEEE, pp. 4374-4379.
View/Download from: Publisher's site
View description>>
In this paper, a portable real-time wireless embedded brain signal acquisition/processing system is developed. The proposed system integrates electroencephalogram signal amplifier technique, wireless transmission technique, and embedded real-time system. The development strategy of this system contains three parts: First, the Bluetooth protocol is used as a transmission interface and integrated with the bio-signal amplifier to transmit the measured physiological signals wirelessly. Second, the OMAP (Open Multimedia Architecture Platform) is used as a development platform and an embedded operating system for OMAP is also designed. Finally, DSP Gateway is developed as a mechanism to deal with the brain-signal analyzing tasks shared by ARM and DSP. A driver's cognitive-state estimation program has been developed and implemented on the proposed dual core processor-based real time wireless embedded system for demonstration. © 2006 IEEE.
Hui, X, Wang, G, Huo, H, Xiao, C & Zhou, R 1970, 'Region-Based Coding for Queries over Streamed XML Fragments', Springer Berlin Heidelberg, pp. 487-498.
View/Download from: Publisher's site
Huo, H, Wang, G, Hui, X, Xiao, C & Zhou, R 1970, 'Document Fragmentation for XML Streams Based on Query Statistics', Springer Berlin Heidelberg, pp. 350-356.
View/Download from: Publisher's site
Huo, H, Wang, G, Hui, X, Zhou, R, Ning, B & Xiao, C 1970, 'Efficient Query Processing for Streamed XML Fragments', Springer Berlin Heidelberg, pp. 468-482.
View/Download from: Publisher's site
Huo, H, Zhou, R, Wang, G, Hui, X, Xiao, C & Yu, Y 1970, 'Efficient Evaluation of Multiple Queries on Streamed XML Fragments', Springer Berlin Heidelberg, pp. 61-72.
View/Download from: Publisher's site
Hussain, F, Chang, E & Dillon, T 1970, 'Ontological Manifestation of Trust for Service Oriented Environment', 2006 IEEE International Conference on Industrial Informatics, 2006 IEEE International Conference on Industrial Informatics, IEEE, Singapore, pp. 593-598.
View/Download from: Publisher's site
View description>>
Trust and reputation are vital components for trusted e-business. In the literature however there has been no effort in proposing ontology for trust. The trusted agent in service oriented environment may trust a software agent or human agent or a service or a product. Based on this distinction, trust ontology could be proposed for different domains .The trust ontology for the individual domains is proposed and discussed.
Hussain, FK, Chang, E & Dillon, TS 1970, 'Defining Reputation in Service Oriented Environment', Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), IEEE, p. 177.
View/Download from: Publisher's site
View description>>
Reputation has a profound impact on the Trusting Agent and Trusted Agent in business interactions. Moral, ethical and legal guidelines are implemented as a result of the promotion of fair trading practices, honesty from all parties, consumer protection legislation, service quality assessment, and assurance for customers, e-businesses and service-oriented environments. In this paper we propose a definition of reputation that is more suited to service oriented environments. Additionally we explain in detail, all the terms in the definition. © 2006 IEEE.
Hussain, O, Chang, E, Hussain, F & Dillon, T 1970, 'Quantifying Risk in Financial Terms in an e-Transaction', 2006 IEEE International Conference on Industrial Informatics, 2006 IEEE International Conference on Industrial Informatics, IEEE, Singapore, pp. 587-592.
View/Download from: Publisher's site
View description>>
An outcome of risk is the possible loss that could incur in an interaction. In a peer-to-peer financial interaction, the possible loss that could incur is usually the financial loss in the resources of the trusting agent that are involved in the interaction. Hence, a consideration for the trusting agent to analyze the risk in interacting with any probable trusted agent in order to decide whether to interact with it or not, is to determine the potential loss in its resources that may occur. In this paper, we will propose a methodology by which the trusting agent can determine beforehand the possible loss that could be incurred to it as a result of interacting with a probable trusted agent.
Hussain, OK, Chang, E, Hussain, FK, Dillon, TS & Soh, B 1970, 'Context and Time Based Riskiness Assessment for Decision Making', Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06), IEEE, p. 104.
View/Download from: Publisher's site
View description>>
In an e-commerce interaction carried out in a Peer-to-Peer environment it is rational for the trusting peer to analyze the Risk that could be involved in dealing with a trusted peer as there is a lack of central management in these type of interactions. Risk analysis can be done by assimilating recommendations from other peers if there is no previous interaction history between the trusting peer and the trusted peer. But the assimilated recommendations might be according to the criteria of the recommending peer with the trusted peer, and it is not necessary for the trusting peer to have the same criteria in its interaction with the trusted peer as that of the recommending peer even thought it is interacting in the same context. Further it might interact in a different time as that of the recommending peer. The Risk that was present in a particular context and at a particular time might not be the same at a different time. Hence in this paper we discuss the process of the trusting peer assimilating the recommendations from the recommending peers according to the context, criteria and time of its interaction in order to determine the Riskiness value of the trusted peer, which would help it considerably in decision making. © 2006 IEEE.
Johnston, AJ, Marks, B & Edmonds, EA 1970, 'Charmed circle - an interactive toy for musicians', ACM International Conference on Digital Interactive Media in Entertainment and Arts, ACM International Conference on Digital Interactive Media in Entertainment and Arts, Research Publishing Services, Bangkok, Thailand, pp. 1-7.
Johnston, AJ, Marks, B, Candy, L & Edmonds, EA 1970, 'Partial reflections: interactive environments for musical exploration', ENGAGE: Interaction, Art and Audience Experience, ENGAGE: Interaction, Art and Audience Experience, Creativity and Cognition Studios Press, Sydney, Australia, pp. 100-109.
View description>>
This paper describes an ongoing project to develop interactive environments for musicians that encourage musical exploration. A process of developing software such as this, where requirements are highly dynamic and unclear is outlined and two musical compositions and associated interactive environments entitled 'Partial Reflections' are described.
Kazienko, P & Musiał, K 1970, 'Social Capital in Online Social Networks', KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 2, PROCEEDINGS, 10th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, Springer Berlin Heidelberg, Bournemouth, ENGLAND, pp. 417-424.
View/Download from: Publisher's site
Kocaballi, AB & Kocyigit, A 1970, 'Granular Best Match Algorithm for Context-Aware Computing Systems', 2006 ACS/IEEE International Conference on Pervasive Services, 2006 ACS/IEEE International Conference on Pervasive Services, IEEE, Lyon, FRANCE, pp. 143-149.
View/Download from: Publisher's site
Kurian, JC, Barnaghi, PM & Hartley, MI 1970, 'User mediated hypermedia presentation generation on the semantic web framework', ADVANCES IN ARTIFICIAL REALITY AND TELE-EXISTENCE, PROCEEDINGS, 16th International Conference on Artificial Reality and Telexistence, SPRINGER-VERLAG BERLIN, PEOPLES R CHINA, Hangzhou, pp. 901-+.
Latu, S & Dyson, LE 1970, 'ICT-The perception of the Togan minority in New Zealand', Cultural attitudes towards technology and communication 2006, Cultural Attitudes towards Technology and Communications, Murdoch University, Tartu, Estonia, pp. 360-371.
Lautenbach, S, Voinov, A & Seppelt, R 1970, 'Localization effects of land use change on hydrological models', Proceedings of the iEMSs 3rd Biennial Meeting,' Summit on Environmental Modelling and Software'.
View description>>
Semi-distributed hydrological models generally have the advantages of short calculation times, comparative low calibration needs and high model efficiency, but lack the ability to consider localization effects of land use change. A regionalisation of these models allows a sensitivity analysis of the localization effects. HBV-D, a conceptual hydrological model is used in this study. The regionalization for the German watershed Parthe (∼317 km 2) is coded in the framework of SME (spatial modeling environment) which allows a fast grid based regionalization of the model. Additional complexity at the finer scale is handled by downscaling of calibration parameters fromthe semi-distributedmodel by using auxiliary information (soil, relief). This allows a better representation of the heterogeneity in the watersheds without the need of grappling with hundreds of calibration parameters. A Monte-Carlo analysis is used to simulate the effects of the different spatial pattern of land use changes on discharge. This allows a better forecasting of land use change effects and can be used to generate uncertainty estimates for existing semi-distributed models. We focus here on the following major questions: 1. how can we downscale the calibration parameters from the semi-distributed model to the distributed model, 2. how do downscaling approaches differ, 3. how does land use composition and configuration influence discharge and 4. how do these results depend on catchment characteristics?
Li, Z, Chen, H & Yu, S 1970, 'Performance optimization for energy-aware adaptive checkpointing in embedded real-time systems', Proceedings -Design, Automation and Test in Europe, DATE.
View description>>
Using additional store-checkpoinsts (SCPs) and compare-checkpoints (CCPs), we present an adaptive checkpointing for double modular redundancy (DMR) in this paper. The proposed approach can dynamically adjust the checkpoint intervals. We also design methods to calculate the optimal numbers of checkpoints, which can minimize the average execution time of tasks. Further, the adaptive checkpointing is combined with the DVS (dynamic voltage scaling) scheme to achieve energy reduction. Simulation results show that, compared with the previous methods, the proposed approach significantly increases the likelihood of timely task completion and reduces energy consumption in the presence of faults.
Lister, R, Simon, B, Thompson, E, Whalley, JL & Prasad, C 1970, 'Not seeing the forest for the trees', Proceedings of the 11th annual SIGCSE conference on Innovation and technology in computer science education, ITiCSE06: 11th Annual Conference on Innovation and Technology in Computer Science Education, ACM, pp. 118-122.
View/Download from: Publisher's site
View description>>
This paper reports on the authors use of the SOLO taxonomy to describe differences in the way students and educators solve small code reading exercises. SOLO is a general educational taxonomy, and has not previously been applied to the study of how novice programmers manifest their understanding of code. Data was collected in the form of written and think-aloud responses from students (novices) and educators (experts), using exam questions. During analysis, the responses were mapped to the different levels of the SOLO taxonomy. From think-aloud responses, the authors found that educators tended to manifest a SOLO relational response on small reading problems, whereas students tended to manifest a multistructural response. These results are consistent with the literature on the psychology of programming, but the work in this paper extends on these findings by analyzing the design of exam questions.
Lister, RF 1970, 'Computer Science Teachers as Amateurs, Students and Reseachers', Koli Calling 2005- Proceeding of the Fifth Koli Calling Conference on Computer Science Education, Baltic Sea Conference on Computing Education Research, Turku Centre for Computer Science, Koli NAtional Park Eastern Finland, pp. 3-12.
Lister, RF 1970, 'Driving learning via criterion-referenced assessment using Bloom's taxonomy', UniServe Science 2006, Uniserve Science Symposium, UniServe Science, Sydney, Australia, pp. 80-88.
Livolsi, D, O'Neill, T, Leaney, J, Denford, M & Dunsire, K 1970, 'Guided architecture-based design optimisation of CBSs', 13TH ANNUAL IEEE INTERNATIONAL SYMPOSIUM AND WORKSHOP ON ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, IEEE International Conference and Workshop on the Engineering of Computer Based Systems, IEEE Computer Soc, Potsdam, GERMANY, pp. 247-256.
View description>>
Computer-Based Systems (CBS) are becoming increasingly pervasive throughout society, continually increasing in complexity and cost as they are called upon to fulfil more and more complicated tasks. Unfortunately, multi-million dollar projects often fail
Lu, H, Zhu, J & Guo, Y 1970, 'Calculation of Differential Inductances for Nonlinear Dynamic Analysis of A Tubular Linear PM Actuator', INTERMAG 2006 - IEEE International Magnetics Conference, INTERMAG 2006 - IEEE International Magnetics Conference, IEEE, p. 766.
View/Download from: Publisher's site
Lu, J & Zhang, G 1970, 'Information integration based team situation assessment in an uncertain environment', Applied Artificial Intelligence, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific Publ Co Pte Ltd, Genova, ITALY, pp. 441-448.
View/Download from: Publisher's site
View description>>
Understanding a situation requires integrating many pieces of information which can be obtained by a group of data collectors from multiple data sources. Uncertainty is involved in situation assessment. How to integrate multi-source multi-member uncertai
Lu, Z, Lu, J, Bai, C & Zhang, G 1970, 'Customer online shopping behaviours analysis using Bayesian networks', AI 2006: Advances in Artificial Intelligence, Proceedings, Australasian Joint Conference on Artificial Intelligence, Springer, Hobart, Australia, pp. 1293-1297.
View/Download from: Publisher's site
View description>>
This study applies Bayesian network technique to analyse the relationships among customer online shopping behaviours and customer requirements. This study first proposes an initial behaviour-requirement relationship model as domain knowledge. Through conducting a survey customer data is collected as evidences for inference of the relationships among the factors described in the model. After creating a graphical structure, this study calculates conditional probability distribution among these factors, and then conducts inference by using the Junction-tree algorithm. A set of useful findings has been obtained for customer online shopping behaviours and their requirements with motivations. These findings have potential to help businesses adopting more suitable online system development.
Luu, J & Kennedy, PJ 1970, 'Investigating the size and value effect in determining performance of Australian listed companies: A neural network approach', Conferences in Research and Practice in Information Technology Series, Australian Data Mining Conference, ACS, Sydney, Australia, pp. 155-161.
View description>>
This paper explores the size and value effect in influencing performance of individual companies using backpropagation neural networks. According to existing theory, companies with small market capitalization and high book to market ratios have a tendency to perform better in the future. Data from over 300 Australian Stock Exchange listed companies between 2000-2004 is examined and a neural network is trained to predict company performance based on market capitalization, book to market ratio, beta and standard deviation. Evidence for the value effect was found over longer time periods but there was less for the size effect. Poor company performance was also observed to be correlated with high risk. © 2006, Australian Computer Society, Inc.
Maxwell, C, O'Neill, T & Leaney, J 1970, 'A framework for understanding heuristics in architectural optimisation', 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06), 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06), IEEE, Potsdam, Germany, pp. 65-72.
View/Download from: Publisher's site
McBride, TM, Henderson-Sellers, B & Zowghi, D 1970, 'Managing outsourced software development', UKAIS 2006- Where theory meets practice, UK Academy of Information Systems Conference, University of Gloucestershire, Cheltenham, UK, pp. 1-13.
McIntosh, BS, Voinov, A, Smith, C & Giupponi, C 1970, 'Bridging the gaps between design and use: Developing appropriate tools for environmental management and policy', Proceedings of the iEMSs 3rd Biennial Meeting,' Summit on Environmental Modelling and Software'.
View description>>
Integrated assessment models, decision support systems (DSS) and Geographic Information Systems (GIS) are examples of a growing number of computer-based tools designed to provide scientific decision and information support to people within environmental management and policy organizations. It is recognized that end-user organizations are often not as receptive to using such tools as desired but that little research has been done to uncover and understand the reasons why. As part of the process to understand what tools are used and why, and conversely what tools are not used and why, this paper presents some views on the issues involved. No claim is made regarding the completeness of the issues covered, rather the purpose of the paper is to instigate discussion about how to improve tool design practices in such a way as to benefit environmental management and policy. Conflict between the aims of tool designers to develop usable and useful tools which also contain some degree of technological innovation is highlighted as a potential cause of problems. A call for clarity of purpose in tool design is made to make it clearer both to the designer and the client organization what the main aim of the design process is as a means of uncovering mismatches in expectation. Further, a call is made for designers to move from a technology-push to a demand-pull perspective as a necessary step towards designing more appropriate tools. A range of social dimensions of relevance to tool design are also discussed including the need to involve clients and stakeholders early in the design process, whether a model should present a simple and engaging story and to what extent good science can be implemented through the use of computer models, and the need to build trust between tool designers and tool users as a necessary part of making tools useful.
Miliszewska, I & Horwood, J 1970, 'Engagement theory', Proceedings of the 37th SIGCSE technical symposium on Computer science education, SIGCSE06: Technical Symposium on Computer Science Education, ACM, pp. 158-162.
View/Download from: Publisher's site
View description>>
A Computer Science degree is offered by Victoria University bothlocally in Australia and transnationally in Hong Kong. The degreeincludes a compulsory final year Project subject. The Project, ateam effort, involves the design and implementation of a real-lifecomputer application for an external client. Academics responsiblefor the degree consider Project and its three components of groupcontext, project-based problems, and outside focus essential totransforming computing students into competent graduates. DoProject students support this view? This paper reports on acomparative study of the students' perceptions of the projectexperience and the relative importance of its three components. Thepaper discusses the results of the study with respect to thedifferent locales, Melbourne and Hong Kong, and concludes byconsidering the implications of the study on the Project model. Copyright 2006 ACM.
Milne, D, Medelyan, O & Witten, I 1970, 'Mining Domain-Specific Thesauri from Wikipedia: A Case Study', 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06), 2006 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)(WI'06), IEEE, Hong Kong, PEOPLES R CHINA, pp. 442-+.
View/Download from: Publisher's site
Nataatmadja, I & Dyson, LE 1970, 'ICT and its impact on managing global virtual teams', INTERNET & INFORMATION SYSTEMS IN THE DIGITAL AGE: CHALLENGES AND SOLUTIONS, International Business Information Management, IBIMA, Brescila, Italy, pp. 498-504.
Niazi, M, Wilson, D & Zowghi, D 1970, 'Implementing software process improvement initiatives: An empirical study', PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROCEEDINGS, Product Focused Software Process Improvement, Springer-Verlag Berlin, Netherlands, pp. 222-233.
View/Download from: Publisher's site
View description>>
In this paper we present findings from our empirical study of software process improvement (SPI) implementation. We aim to provide SPI practitioners with insight into designing appropriate SPI implementation initiatives in order to achieve better results
Pileggi, SF, Palau, CE, Esteve, M & Esteve, M 1970, 'Grid Sensor/Actuator Network Architecture', 2006 International Conference on Wireless and Mobile Communications (ICWMC'06), 2006 International Conference on Wireless and Mobile Communications (ICWMC'06), IEEE, p. 3.
View/Download from: Publisher's site
View description>>
Low cost and low power sensor concept is logically extended by sensor network idea. Large-scale intelligent systems, sensor networks based, can be developed integrating sensor networks and high level distributed computational paradigms as Grid Computing. © 2006 IEEE.
Prior, J, Robertson, T & Leaney, J 1970, 'Technology designers as technology users', Proceedings of the 20th conference of the computer-human interaction special interest group (CHISIG) of Australia on Computer-human interaction: design: activities, artefacts and environments - OZCHI '06, the 20th conference of the computer-human interaction special interest group (CHISIG) of Australia, ACM Press, Sydney, Australia, pp. 353-356.
View/Download from: Publisher's site
View description>>
This paper is about the developer as technical user interacting with computer technology as part of the infrastructure that makes possible their 'real work' of developing a large and complex software product. A longitudinal ethnographic study of work practice in a software development company that uses an Agile development approach found that the developers spend a large part of their working time designing, creating, modifying and interacting with infrastructure to enable and support their software development work. This empirical work-in-progress shows that an understanding of situated technology design may have implications for the future development of HCI methods, tools and approaches
Prior, JR, Robertson, TJ & Leaney, JR 1970, 'Programming Infrastructure and Code Production: An Ethnographic Study', Team Ethno-Online Journal, Issue 2 June 2006, Ethnographies of Code: Computer Programs as Lived Work of Computer Programming, TeamEthno-Online, Lancashire, UK, pp. 112-120.
Qumer, A & Henderson-Sellers, B 1970, 'A Framework to Support Non-fragile Agile Agent-Oriented Software Development', NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, International Conference on Software Methods and Tools, IOS Press, Quebec, Canada, pp. 84-100.
View description>>
Agile software development methods support mainly object-oriented, feature-oriented and component-oriented software development and do not address agent-oriented and aspect-oriented software development. The concepts of agents and objects are in many ways dissimilar; and an object-oriented approach is not immediately suitable for the development of a multiagent system. In our current research, we extend agile software development methods originating primarily in object-oriented technology to support agent-orientation in the context of the development of multiagent systems. This research paper introduces a new agile agent-oriented framework to create or tailor situation-specific non-fragile agile agent-oriented software development processes (using a method engineering approach) to support multi-agent software development.
Qumer, A & Henderson-Sellers, B 1970, 'Comparative evaluation of XP and scrum using the 4d analytical tool (4-DAT)', Proceedings of the European and Mediterranean Conference on Information Systems, EMCIS 2006.
View description>>
The emergence of agile software development methods provides a contribution to contemporary software engineering practices. Agile methods have several benefits over traditional plan-based methods, in particular their ability to handle projects where requirements are not fixed. In the last few years, a number of agile software development methods have been developed but a detailed evaluation (which is essential) of these methods is not available. This paper presents a detailed comparative analysis of two well known agile methods (XP and Scrum), using the previously published 4- Dimensional Analytical Tool (4-DAT), based on four characterization perspectives: those of scope, agility, agile values and software process. A report generated with the help of 4-DAT will assist organizations in making decisions about the selection or adoption of an agile method.
Qumer, A, Henderson-Sellers, B & INSTICC 1970, 'Crystallization of agility - Back to basics', ICSOFT 2006: Proceedings of the First International Conference on Software and Data Technologies, Vol 2, International Conference on Software and Data Technologies, INSTICC, Setubal, Portugal, pp. 121-126.
View description>>
There are a number of agile and traditional methodologies for software development. Agilists provide agile principles and agile values to characterize the agile methods but there is no clear and inclusive definition of agile methods; subsequently it is not feasible to draw a clear distinction between traditional and agile software development methods in practice. The purpose of this paper is to explain the concept of agility in detail; and then to suggest a definition of agile methods that would help in the ranking or differentiation of agile methods from other available methods.
Roy, K, Sharma, N, Pal, T & Pal, U 1970, 'Online Bangla Handwriting Recognition System', Advances in Pattern Recognition, Proceedings of the Sixth International Conference, WORLD SCIENTIFIC.
View/Download from: Publisher's site
Sharma, N, Pal, U & Kimura, F 1970, 'Recognition of Handwritten Kannada Numerals', 9th International Conference on Information Technology (ICIT'06), 9th International Conference on Information Technology (ICIT'06), IEEE, pp. 133-136.
View/Download from: Publisher's site
View description>>
This paper deals with a quadratic classifier based scheme for the recognition of off-line handwritten numerals of Kannada, an important Indian script. The features used in the classifier are obtained from the directional chain code information of the contour points of the characters. The bounding box of a character is segmented into blocks and the chain code histogram is computed in each of the blocks. Here we have used 64 dimensional and 100 dimensional features for a comparative study on the recognition accuracy of our proposed system. This chain code features are fed to the quadratic classifier for recognition. We tested our scheme on 2300 data samples and obtained 97.87% and 98.45% recognition accuracy using 64 dimensional and 100 dimensional features respectively, from the proposed scheme using five-fold cross-validation technique. © 2006 IEEE.
Sheridan-Smith, N, O'Neill, T, Leaney, J & Hunter, M 1970, 'A Policy-based Service Definition Language for Service Management', 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, IEEE, Vancouver, Canada, pp. 282-293.
View/Download from: Publisher's site
View description>>
In a competitive environment, Service Providers wish to deliver services in a lean and agile manner, despite the rising complexity and heterogeneity within the network. The desire to support personalised customer experiences and differentiated services requires that management systems are increasingly flexible, adaptable and dynamic. Policy-based Management (PBM) systems can be helpful in reducing complexity and enhancing flexibility, but they have not typically been involved in end-to-end management of the services, leading to only the partial management of different network functions. By using a policy-based service definition language, a Service Provider is able to specify the structure of services and the manner in which they are to be dynamically managed for each customer over time in response to different network events. Combined with a generic PBM system that supports different management models, policies can be used to describe all of the functional aspects of a service. As a result, Service Providers have the potential to deliver new and modified services quickly and easily, since the definitions can be altered as their needs evolve in the medium- or long-term. © 2006 IEEE.
Simon, B, Lister, R & Fincher, S 1970, 'Multi-Institutional Computer Science Education Research: A Review of Recent Studies of Novice Understanding', Proceedings. Frontiers in Education. 36th Annual Conference, Proceedings. Frontiers in Education. 36th Annual Conference, IEEE, pp. 12-17.
View/Download from: Publisher's site
View description>>
There has been a recent proliferation of multi-national, multi-institutional computer science education research exploring issues surrounding novice computer science student understanding. The large numbers of students studied in these efforts and their breadth in terms of student background (both technically and culturally) has led to significant interest in the work. In this paper, we summarize each study, identifying the populations studied, the types of data collected, the analyses performed and review the primary results. We also report on current ongoing work related to and derived from these efforts. © 2006 IEEE.
Sixsmith, A, Dyson, LE & Nataatmadja, I 1970, 'Improving class participation in it tutorials and small lectures', ACIS 2006 Proceedings - 17th Australasian Conference on Information Systems, Australasian Conference on Information Systems, Australasia Association of Informaton Systems, Adelaide, Australia, pp. 1-10.
View description>>
The aim of this paper is to present some initial findings from an investigation into strategies for improving class participation in tutorials and small lectures in the Information Technology (IT) context. The research used a qualitative approach and data collection was undertaken using student focus groups and semistructured interviews with academics in an Australian IT Faculty. The findings highlight various reasons why students do or don't participate. Also strategies which academics can utilise to encourage student participation in IT tutorials and small lectures were discovered. © 2006 Alan Sixsmith, Laurel Evelyn Dyson & Indrawati Nataatmadja.
Solomon, A, Santamaria, D & Lister, R 1970, 'Automated Testing of Unix Command-line and Scripting Skills', 2006 7th International Conference on Information Technology Based Higher Education and Training, 2006 7th International Conference on Information Technology Based Higher Education and Training, IEEE, Sydney, Australia, pp. 120-160.
View/Download from: Publisher's site
Sood, S, Woodside, AG & Miller, K 1970, 'Analysing iconic consumer brand weblogs', AAAI Spring Symposium - Technical Report, pp. 206-210.
View description>>
The stories consumers report and tell in which they use brands as props or anthropomorphic actors increasingly form a key part of personal and community Weblogs. These stories are drama enactments enabling the storytellers to experience powerful myths. The brand stories consumers tell on purchasing-consumption requires a protagonist consumer to experience an 'inciting incident' (McKee 2003) that focuses her attention and results in action in response to this incident. Since stories help to make sense of the world around us it is not surprising that consumer storytelling about brands extends beyond highly risky consumption acts to the more mundane and improvisational presentations of self (to self and others) in everyday life. With an understanding of the structure of the brand stories consumers report and tell on Weblogs this study compares the application of semantic analysis software (Smith 2000) automating the text analysis with a manual interpretation involving the human mind using Heider's balance theory to examine the stories consumers report about two well known clothing brands in naturally occurring contexts on Weblogs. Taking this approach, one can gain insights in determining if market researchers can automatically process Weblogs to obtain brand story abstractions. Copyright © 2002, American Association for Artificial Intelligence (www.aaai.org). All rights reserved.
Sood, SC & Pattinson, HM 1970, 'The open source marketing experiment: Using wikis to revolutionize marketing practice on the web.', Opening the network - New perspectives in industrial marketing and purchasing: 22nd Industrial Marketing and Purchasing Group Conference, 22nd Industrial Marketing and Purchasing Group Conference, The IMP Group, Milan, Italy, p. CD no page.
Thompson, E, Whalley, J, Lister, RF & Simon, B 1970, 'Code classification as a learning and asssessment exercise for novice programmers', Proceeding of the 19th annual conference of the ational advisory committee on computing qualifications, National Advisory Committee on Computing Qualifications, National advisory comittee on computing qualifications, Wellington, New Zealand, pp. 291-298.
Voinov, A, Hood, RR & Daues, JD 1970, 'Building a community modeling and information sharing culture', Proceedings of the iEMSs 3rd Biennial Meeting,' Summit on Environmental Modelling and Software'.
View description>>
By copying information from sources and distributing it to new destinations we do not lose information at the sources. Nevertheless, exchange of information is still restricted by patent law, as well as by institutional, cultural and traditional hurdles that create protective barriers hindering the free flow of this valuable commodity. We believe that one of the greatest challenges we face in creating a new research paradigm will be building the community modeling and information sharing culture. How do we get engineers and scientists to put aside their traditional modes of doing business? How do we provide the incentives that will be required to make these changes happen? How do we get our colleagues to see that the benefits of sharing resources far outweigh the costs? We argue that timely sharing of data and information is not only in the best interest of the research community, but that it is also in the best interest of the scientist who is doing the sharing.
Wang, C, Lu, J, Zhang, G & SOC, IC 1970, 'Integration of ontology data through learning instance matching', 2006 IEEE/WIC/ACM International Conference on Web Intelligence, (WI 2006 Main Conference Proceedings), IEEE/WIC/ACM international Conference on Web Intelligence and Intelligent Agent Technology, IEEE Computer Society, HK, China, pp. 536-539.
View/Download from: Publisher's site
View description>>
Information integration with the aid of ontology can roughly be divided into two levels: schema level and data level. Most research has been focused on the schema level, i.e., mapping/matching concepts and properties in different ontologies with each other. However, the data level integration is equally important, especially in the decentralized semantic Web environment. Noticing that ontology data (in the form of instances of concepts) from different sources often have different perspectives and may overlap with each other, we develop a matching method that utilizes the features of ontology and employs the machine learning approach to integrate those instances. By exploring ontology features, this method performs better than other general methods, which is revealed in our experiments. Through the process that implements the matching method, ontology data can be integrated together to offer more sophisticated services
Xu, G, Zhang, Y & Begg, R 1970, 'Mining Gait Pattern for Clinical Locomotion Diagnosis Based on Clustering Techniques', Advanced Data Mining And Applications, Proceedings, 2nd International Conference on Advanced Data Mining and Applications, Springer Berlin Heidelberg, Xian, PEOPLES R CHINA, pp. 296-307.
View/Download from: Publisher's site
View description>>
Scientific gait (walking) analysis provides valuable information about an individual's locomotion function, in turn, to assist clinical diagnosis and prevention, such as assessing treatment for patients with impaired postural control and detecting risk o
Xu, G, Zhang, Y & Zhou, X 1970, 'Discovering task-oriented usage pattern for web recommendation', Conferences in Research and Practice in Information Technology Series, 17th Australasian Database Conference, Australian Computer Society, Hobart, Tasmania, Australia, pp. 167-174.
View description>>
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usage data. With the discovered usage pattern information, it is possible to recommend Web user more preferred content or customized presentation according to the derived task preference. In this paper, we propose a Web recommendation framework based on discovering task-oriented usage pattern with Probabilistic Latent Semantic Analysis (PLSA) model. The user intended tasks are characterized by the latent factors through probabilistic inference, to represent the user navigational interests. Moreover, the active user's intuitive task-oriented preference is quantized by the probabilities, by which pages visited in current user session are associated with various tasks as well. Combining the identified task preference of current user with the discovered usage-based Web page categories, we can present user more potentially interested or preferred Web content. The preliminary experiments performed on real world data sets demonstrate the usability and effectiveness of the proposed approach. © 2006, Australian Computer Society, Inc.
Yan, Y, Zhu, J, Guo, Y & Lu, H 1970, 'Modeling and Simulation of Direct Torque Controlled PMSM Drive System Incorporating Structural and Saturation Saliencies', Conference Record of the 2006 IEEE Industry Applications Conference Forty-First IAS Annual Meeting, Conference Record of the 2006 IEEE Industry Applications Conference Forty-First IAS Annual Meeting, IEEE, IEEExplorer, pp. 76-83.
View/Download from: Publisher's site
View description>>
The direct torque controlled (DTC) permanent magnet synchronous motor (PMSM) drive has become competitive compared with other types of drive systems because of its simple and sensorless control algorithm. The application of the system, however, is handicapped by the difficulty of starting under full load due to the unknown initial rotor position. This paper presents a nonlinear model of PMSMs which incorporates both the structural and saturation saliencies to enable the numerical simulation of initial rotor position detection algorithms. In this model, the phase inductances are expressed by Fourier series as functions of the stator current and rotor position. The inductances of a surface mounted PMSM is measured with different rotor positions and DC offset currents, which emulate the effect of the three phase stator currents. By using the proposed model, the DTC PMSM is simulated and the results are compared with those obtained by the PMSM model in the Simulink library. With the model, an initial rotor position estimation scheme using voltage pulses is investigated by numerical simulation. The scheme is also experimentally tested and the results are compared with the inductance variation to verify the validity of the method. The effectiveness of the scheme to estimate the initial rotor position for the testing SPMSM is analyzed and verified by numerical simulation before physical implementation
Yusop, N, Lowe, DB & Zowghi, D 1970, 'A survey of issue resolution on the incremental refinement of the system scope in web system development', Proceedings of the 6th international conference on Web engineering - ICWE '06, the 6th international conference, ACM Press, Palo Alto, CA, USA, pp. 313-320.
View/Download from: Publisher's site
View description>>
Increasingly, IT systems and Web systems in particular, fall into the class of applications where the scope of the application to be developed cannot be clearly articulated a priori. This is for a range of reasons, but is at least in part due to the complex inter-dependencies which exist between different aspects of the problem domain. While Whereas the core system requirements might be clear, the domain inter-dependencies lead to ancillary requirements which are only identified as the emerging system and its relationship to the domain are understood. A key mechanism in supporting the development of this understanding is the exploration of application pilots or prototypes, and the subsequent identification of solution or problem domain issues. The resolution of these issues will often play a crucial role in supporting the development of domain understanding and hence project scope. In this paper we explore this phenomenon by analysing issue handling across a range of case studies. We describe a model of the issue resolution process and highlight those issues which are most likely to assist in clarification of project scope.
Yusop, N, Zowghi, D & Lowe, D 1970, 'The impacts of non-functional requirements in web system projects', Proceedings of the European and Mediterranean Conference on Information Systems, EMCIS 2006, European, Mediterranean and Middle Eastern Conference on Information Systems, Brunel University, Alicante, Spain, pp. 1-8.
View description>>
In Web system development, the non-functional requirements (NFRs) are typically considered only briefly during the requirements elicitation stage and not rigorously articulated by either Web developers or the client. This paper reports on an investigation into this issue involving interviews with Web developers who were engaged in commercial Web development projects. The results from this qualitative research highlight that Web developers commonly do not pay sufficient attention to NFRs. This arises due to uncertainty, lack of time, lack of knowledge in the importance of NFRs and partly because NFRs are not readily available and documented from previous similar projects. Web developers also do not elicit NFR at the same time and at the same level of details as functional requirements (FRs). This study highlights that a lack of rigor in articulating NFRs may significantly impact on the development effectiveness and the quality of the resulting Web system.
Zhang, G, Lu, J & Dillon, T 1970, 'An approximation branch-and-bound algorithm for fuzzy bilevel decision making problems', Proceedings of the International Multiconference on Computer Science and Information Technology, IMCSIT, Autumn meeting point of Polish information processing society, PTI, Wisla, Poland, pp. 223-231.
View description>>
Organizational decision making often involves two decision levels. When the leader at the upper level attempts to optimize his/her objective, the follower at the lower level tries to find an optimized strategy according to each of possible decisions made by the leader. Furthermore, such bilevel decision making may involve uncertain parameters which appear either in the objective functions or constraints of the leader or the follower. Following our previous work on fuzzy bilevel decision making, this study proposes a solution concept and related theorems for general- fuzzy-number based fuzzy parameter bilevel programming problems. It then develops an approximation Branch-and-bound algorithm to solve the proposed problem. © 2006 PIPS.
Zhang, G, Lu, J & Dillon, T 1970, 'An extended Branch-and-Bound algorithm for fuzzy linear bilevel programming', Applied Artificial Intelligence, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World scientific, Genova, Italy, pp. 291-298.
View/Download from: Publisher's site
View description>>
This paper presents an extended Branch-and-Bound algorithm for solving fuzzy linear bilevel programming problems. In a fuzzy bilevel programming model, the leader attempts to optimize his/her fuzzy objective with a consideration of overall satisfaction,
Zhang, G, Zhang, G, Lu, J & Lu, H 1970, 'Environmental/economic dispatch using genetic algorithm and fuzzy number ranking method', Applied Artificial Intelligence, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Genova, Italy, pp. 59-66.
View/Download from: Publisher's site
View description>>
NA
Zhang, J, Lu, J, Zhang, G & Yan, X 1970, 'An integrated analysis method for bank customer classification', Applied Artificial Intelligence, International Fuzzy Logic and Intelligent technologies in Nuclear Science Conference, World Scientific, Genova, Italy, pp. 247-252.
View/Download from: Publisher's site
View description>>
NA
Zhao, N, Song, YH & Lu, H 1970, 'Risk assessment of strategies using total time on test transform', 2006 IEEE Power Engineering Society General Meeting, 2006 IEEE Power Engineering Society General Meeting, IEEE, Montreal, Quebec, Canada, pp. 1-8.
View/Download from: Publisher's site
Zheng, L, Jin, J, Guo, Y, Lu, H & Zhu, J 1970, 'Technology and Development of High Temperature Superconducting Linear Motors Conference', Proceedings of the Australasian Universities Power Engineering Conference, Australasian Universities Power Engineering Conference, Victoria, University, Melbourne, Australia, pp. 1-6.
Zheng, Z, Zhang, G, He, Q, Lu, J & Shi, Z 1970, 'Rule sets based bilevel decision model', Conferences in Research and Practice in Information Technology Series, Australasian Computer Science Conference, ACM Digital Library, Hobart, Australia, pp. 113-120.
View description>>
Bilevel decision addresses the problem in which two levels of decision makers, each tries to optimize their individual objectives under constraints, act and react in an uncooperative, sequential manner. Such a bilevel optimization structure appears naturally in many aspects of planning, management and policy making. However, bilevel decision making may involve many uncertain factors in a real world problem. Therefore it is hard to determine the objective functions and constraints of the leader and the follower when build a bilevel decision model. To deal with this issue, this study explores the use of rule sets to format a bilevel decision problem by establishing a rule sets based model. After develop a method to construct a rule sets based bilevel model of a real-world problem, an example to illustrate the construction process is presented. Copyright © 2006, Australian Computer Society, Inc.
Zhu, T 1970, 'An Outlier Detection Model Based on Cross Datasets Comparison for Financial Surveillance', 2006 IEEE Asia-Pacific Conference on Services Computing (APSCC'06), 2006 IEEE Asia-Pacific Conference on Services Computing, IEEE, pp. 601-604.
View/Download from: Publisher's site
View description>>
Outlier detection is a key element for intelligent financial surveillance systems which intend to identify fraud and money laundering by discovering unusual customer behaviour pattern. The detection procedures generally fall into two categories: comparing every transaction against its account history and further more, comparing against a peer group to determine if the behavior is unusual. The later approach shows particular merits in efficiently extracting suspicious transaction and reducing false positive rate. Peer group analysis concept is largely dependent on a cross-datasets outlier detection model. In this paper, we propose a new cross outlier detection model based on distance definition incorporated with the financial transaction data features. An approximation algorithm accompanied with the model is provided to optimize the computation of the deviation from tested data point to the reference dataset. An experiment based on real bank data blended with synthetic outlier cases shows promising results of our model in reducing false positive rate while enhancing the discriminative rate remarkably. © 2006 IEEE.