For the latest issues of JRPIT please visit the JRPIT section in the ACS website

Volume 43, No.3, 2011 - Contents

Rafael Valencia-Garcia and Francisco Garcia Sanchez
Guest Editorial

Marko Boskovic, Dragan Gasevic, Bardia Mohabbati, Mohsen Asadi, Marek Hatala, Nima Kaviani and Jeffrey Rusk
Developing Families of Software Services: A Semantic Web Approach

Youna Jung and Minsoo Kim
Ontology-based Dynamic Role Interaction Control in Multi-Agent Systems

Enrique Jimenez-Domingo, Juan Miguel Gomez-Berbis, Ricardo Colomo-Palacios and Angel Garcia-Crespo
CARL: A Complex Applications Interoperability Language based on Semantic Technologies for Platform-as-a-Service Integration and Cloud Computing

Chunlei Fu, Qichang Duan, Li Fu, Hong Xiang, Zhongyang Xiong and Haibo Hu
A Learning Framework for Transitioning Network Intrusion Alerts Management System to Ontology

Volume 43, No.2, 2011 - Contents

Rafael Valencia-Garcia and Francisco Garcia Sanchez
Guest Editorial

Waqas Ahmed, Muhammad Ahtisham Aslam, Antonio A. Lopez-Lorca, Jun Shen, Ghassan Beydoun and Debbie Richards
Using Ontologies to Synchronize Change in Relational Database Systems

Ebrahim Bagheri, Faezeh Ensan, Dragan Gasevic and Marko Boskovic
Modular Feature Models: Representation and Configuration

Katia Vila, Jose-Norberto Mazón and Antonio Ferrández
Model-driven Development for Adapting Question Answering Systems to Restricted Domains

Astrid Duque-Ramos, Jesualdo Tomás Fernández-Breis, Robert Stevens and Nathalie Aussenac-Gilles
OQuaRE: A SQuaRE-based Approach for Evaluating the Quality of Ontologies

Volume 43, No.1, 2011 - Contents

Dragan Gasevic, Georg Grossman and Sylvain Halle
Guest Editorial

Thomas Eisenbarth, Florian Lautenbacher, Bernhard Bauer
Adaptation of Process Models – A Semantic-based Approach

Jens Dietrich
An Ontological Model for Component Collaboration

Shusaku Iida, Grit Denker and Carolyn Talcott
Document Logic: Risk Analysis of Business Processes Through Document Authenticity

Christoph Brandt, Frank Hermann, Jan Friso Groote
Generation and Evaluation of Business Continuity Processes using Algebraic Graph Transformation and the mCRL2 Process Algebra

Volume 42, No.4, 2010 - Contents

Professor John Yearwood
Editorial

Vu Van Tan, Dae-Seung Yoo and Myeong-Jae Yi
Designing and Developing a Modern Distributed Data Acquisition and Monitoring System

Leelien Ken Huang
A Resource-based Analysis of IT Personnel Capabilities and Strategic Alignment

Georg Grossmann, Michael Schrefl and Markus Stumptner
Modelling and Enforcement of Inter-Process Dependencies with Business Process Modelling Languages

Volume 42, No.3, 2010 - Contents

Professor John Yearwood
Editorial

Eunkyoung Jee, Seungjae Jeon, Sungdeok Cha, Kwangyong Koh, Junbeom Yoo, Geeyong Park, Poonghyun Seong
FBDVerifier: Interactive and Visual Analysis of Counterexample in Formal Verification of Function Block Diagram

SPECIAL ISSUE EDITORIAL

Seongcheol Kim, Heejin Lee, Myeong Ho Lee
Research in Convergence: A Literature Analysis

Seongcheol Kim, Changi Nam, Hyun-Kyung Jung, Min-Ho Ryu
Adoption of Fixed-mobile Convergence in the U.S. Telecommunication Industry

Yeong-Wha Sawng, Kiyong Om, Bongsik Shin, Jungmann Lee
Discontinuous Innovation and Market Chasm: The Case of Digital Convergence Services

Volume 42, No.2, 2010 - Contents

John Yearwood
Editorial

Bratislav Predic, Dejan Rancic and Aleksandar Milosavljevic
Impacts of Applying Automated Vehicle Location Systems to Public Bus Transport Management

Eva C. Yen
Using Modified Adaptive Neural Fuzzy Real-time Workshop for Self-correction of the Option Pricing Model

Chi Yang, Chengfei Liu and Jianxin Li, Jeffrey Xu Yu, Junhu Wang
A Query System for XML Data Stream and its Semanticsbased Buffer Reduction

Dongqiang Yang and David M.W. Powers
Using Grammatical Relations to Automate Thesaurus Construction

Abhijit Ray, Thambipillai Srikanthan and Wu Jigang
Rapid Techniques for Performance Estimation of Processors

Volume 42, No.1, 2010 - Contents

Professor John Yearwood
Editorial

Zhonglong Zheng and Xueping Chang
Laplacian MinMax Discriminant Projection and its Applications

Sven Hartmann, Sebastian Link, Thu Trinh
Sample-based Decision Support for Specifying XML Constraints

ACIS2007 SPECIAL COLLECTION

Aditya Agrawal, Gavin Finnie1 and Padmanabhan Krishnan
A General Framework to Measure Organizational Risk during Information Systems Evolution and its Customization

Artem Vorobiev, Nargiza Bekmamedova
An Ontology-Driven Approach Applied to Information Security

Volume 41, No. 4, 2009 - Contents

Mu-Yen Chen, PhD
Guest Editorial

Pao-Hua Chou and Menq-Jiun Wu
Accessing e-Learners' Knowledge for Personalization in e-Learning Environment

Po-Han Wu, Gwo-Jen Hwang and Hui-Chun Chu, Chin-Chung Tsai, Yueh-Min Huang
A Computer-Assisted Collaborative Approach for Developing Enterprise e-Training Courses on the Internet

Ting-Chun Tung, Shing-Sheng Guan and Cheng-Hsun Hsieh
A Study of the Illustrative Style Effect of Icon Design –Using the Digital Camera Icon as an Example

Volume 41, No. 3, 2009 - Contents

Sidney A. Morris
Editorial  

Xinzhong Zhu, Jianmin Zhao, C. J. Duanmu and Huiying Xu

Noisy Motion-blurred Images Restoration Based on RBFN 

 

Lynn A. DeNoia and Anne L. Olsen

RFID and Application Security

 

Shinae Shin, Dongwon Jeong and Doo-Kwon Baik

Translating Topic Maps to RDF/RDF Schema for The Semantic Web

 

Kevin A. Johnston, Neil Botha, Nevashan Pillay and Shane Posthumus

Investigating the Role of Value Creation in Information Systems Relevance

 

Ya-Yueh Shih and Siao-Sian Huang

The Actual Usage of ERP Systems: An Extended Technology Acceptance Perspective

Volume 41, No. 2, 2009 - Contents

Eduardo Fernández-Medina, Alfonso Rodríguez, and Mariemma Yague
Guest Editorial  

Michael VanHilst, Eduardo B. Fernandez and Fabrício Braz

A Multi-Dimensional Classification for Users of Security Patterns 

 

William M. Fitzgerald, Simon N. Foley and Micheál Ó Foghlú

Network Access Control Configuration Management using Semantic Web Techniques

 

Joaquín Lasheras, Rafael Valencia-García, Jesualdo Tomás Fernández-Breis and Ambrosio Toval

Modelling Reusable Security Requirements based on an Ontology Framework

 

Carlos Blanco, Ignacio García-Rodríguez de Guzmán, David G. Rosado, Eduardo Fernández-Medina and Juan Trujillo

Applying QVT in Order to Implement Secure Data Warehouses in SQL Server Analysis Services

 

Michele Chinosi and Alberto Trombetta

Integrating Privacy Policies into Business Processes

 

Min-Hua Shao and Shin-Jia Huang

Lightweight Anonymous Routing for Reliability in Mobile Ad-Hoc Networks

 

Pino Caballero-Gil, Amparo Fúster-Sabater and M. Eugenia Pazo-Robles

New Attack Strategy for the Shrinking Generator

 

Sidney A. Morris

ACS Seeks Nominations for IT Journal Editor

Volume 41, No. 1, 2009 - Contents

Sidney A. Morris
Editorial  

Laurie McLeod, Stephen MacDonell and Bill Doolin

IS Development Practice in New Zealand Organisations 

 

Changi Nam, Seongcheol Kim, Hongkyu Lee and Bin Duan

Examining the Influencing Factors and the Most Efficient Point of Broadband Adoption in China

 

You-Heng Hu and Linlin Ge

Learning Ranking Functions for Geographic Information Retrieval Using Genetic Programming

 

Doina Tatar, Gabriela, Serban, Andreea Mihis and Rada Mihalcea

Textual Entailment as a Directional Relation

 

Asad Amir Pirzada, Marius Portmann and Jadwiga Indulska

AODV-HM: A Hybrid Mesh Ad-hoc On-demand Distance Vector Routing Protocol

Volume 40, No. 4, 2008 - Contents

Ljiljana Brankovic, Mirka Miller and Chris Steketee
Guest Editorial  

Samiha Ayed, Nora Cuppens-Boulahia and Frederic Cuppens

Deploying Access and Flow Control in Distributed Workflows

 

Pino Caballero-Gil, Amparo Fúster-Sabater and Oscar Delgado-Mohatar

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences

 

Josep M. Miret, Rosana Tomàs and Magda Valls, Daniel Sadornil and Juan Tena

Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves

 

Kun Peng and Feng Bao and Ed Dawson

Correct, Private, Flexible and Efficient Range Test

 

Index of Volume 40

Index

Volume 40, No. 3, 2008 - Contents

Ljiljana Brankovic, Mirka Miller and Chris Steketee
Guest Editorial  

Kirsten Wahlstrom and Gerald Quirchmayr

A Privacy-Enhancing Architecture for Databases

 

Adepele Williams and Ken Barker

Controlling Inference: Avoiding P-level Reduction During Analysis

 

Vijayakrishnan Pasupathinathan, Josef Pieprzyk and Huaxiong Wang

Security Analysis of Australian and E.U. E-passport Implementation

 

Volker Fusenig, Dagmara Spiewak, and Thomas Engel

Anonymous Communication in Multi Hop Wireless Networks

Volume 40, No. 2, 2008 - Contents

Sidney A. Morris
Editorial  

Tapio Litmanen and Anu Tulkkanen

Global Sense of Risk: Media Reporting on Scientific Studies and Potential Risk of Mobile Phones

 

Gwan-Hwan Hwang, Hsin-Fu Lin, Chun Chin Sy and Chiu-Yang Chang

The Design and Implementation of Appointed File Prefetching for Distributed File Systems

 

Esam Khan, M. Watheq El-Kharashi, Fayez Hebali and Mostafa Abd-El-Barr

Design Space Exploration of a Reconfigurable HMAC-Hash Unit

 

Ashfaqur Rahman and Manzur Murshed

Dynamic Texture Synthesis Using Motion Distribution Statistics

Volume 40, No. 1, 2008 - Contents

Sidney A. Morris
Editorial  

Chad Lin, Graham Pervan, Hsiu-Yuan Tsao and Koong H.-C. Lin

An Investigation into Business-to-Business Electronic Commerce Organizations

 

Tom McBride

A Model for Investigating Software Accidents

 

Nan Tang, Jeffrey Xu Yu, Kam-Fai Wong and Jianxin Li

Fast XML Structural Join Algorithms by Partitioning

 

Jian Weng, Shengli Liu, Kefei Chen and Xiangxue Li

Identity-Based Parallel Key-Insulated Signature: Framework and Construction

Volume 39, No. 4, 2007 - Contents

Sidney A. Morris
Editorial  

Benjamin Lim, Heejin Lee and Sherah Kurnia

Exploring the Reasons for a Failure of Electronic Payment Systems: A Case Study of and Australian Company

 

Alejandra Cechich and Mario Piattini

A Six Sigma-Based Process to Improve COTS Component Filtering

 

Chunyu Bao, TseNgee Neo and Sheng-Uei Guan

Reduced Pattern Training In Pattern Distributor Networks

 

Regina Berretta, Alexandre Mendes and Pablo Moscato

Selection of Discriminative Genes in Microarray Experiments Using Mathematical Programming

Volume 39, No. 3, 2007 - Contents

Sidney A. Morris
Guest Editorial  

Lu Yaobin and Zhou Tao

A Research of Consumers' Initial Trust in Online Stores in China

 

Jianyun Xu, Andrew H. Sung, Srinivas Mukkamala and Qingzhong Liu

Obfuscated Malicious Executable Scanner

 

Siwoo Byun, Seongyun Cho and Moonhaeng Huh

Flash Memory Shadow Paging Scheme for Portable Computers: Design and Performance Evaluation

 

Sung Jin Kim, Hyungdong Lee and Hyoung-Joo Kim

Adaptive Partitioned Indexes for Efficient XML Keyword Search

Volume 39, No. 2, 2007 - Contents

Bill Appelbe and David Bannon
Guest Editorial  

Bill Appelbe and David Bannon

eResearch - Paradigm Shift or Propaganda

 

Steve Smith and Masahiro Takatsuka

Towards a Standards-based Message-oriented Advanced Collaboration System

 

Erik Vullings, James Dalziel and Markus Buchhorn

Secure Federated Authentication and Authorisation to GRID Portal Applications using SAML and XACML

 

Marco La Rosa, Glenn Moloney and Lyle Winton

Towards Belle Monte Carlo Production on the APAC National Grid Infrastructure

 

Elizabeth Post

Designing and Implementing a Grid Application for Cumulative Agrichemical Residue Tracking using Third-Party Data Sources and Software Components

 

Jason Roberts, Petra Heil, Steven J. Phipps and Nathan Bindoff

AusCOM: The Australian Community Ocean Model

 

Gary G. Brassington, Tim Pugh, Claire Spillman, Eric Schulz, Helen Beggs, Andreas Schiller and Peter R. Oke

BLUElink> Development of Operational Oceanography and Servicing in Australia

Volume 39, No. 1, 2007 - Contents

Sidney A. Morris
Editorial  

Jianyun Xu, Andrew H. Sung and Qingzhong Liu

Behaviour Mining for Fraud Detection

 

Asad Amir Pirzada, Chris McDonald and Amitava Datta

Dependable Dynamic Source Routing without a Trusted Third Party

 

Aaron Ceglar and John F. Roddick

Incremental Association Mining using a Closed-Set Lattice

 

Saeed Parsa and Omid Bushehrian

Genetic Clustering with Constraints

 

Iftekhar Ahmad and Joarder Kamruzzaman

Preemption Policy in QoS-Enabled Networks: A Customer Centric Approach

Volume 38, No. 4, 2006 - Contents

Hassan Reza and Emanuel S. Grant
Guest Editorial  

Jacky Estublier, Anca Daniela Ionita, and German Vega

Relationships for Domain Reuse and Composition

 

Mira Kajko-Mattsson, Claus Nielsen, Per Winther, Brian Vang and Anne Petersen

Eliciting CM3: Emergency Problem Management at Scandinavian Airline Systems

 

Hertong Song, Chokchai Leangsuksun and Raja Nassar

Availability Modeling and Evaluation on High Performance Cluster Computing Systems

 

Rajesh Sudarsan and Jeff Gray

Metamodel Search: Using XPath to Search Domain-Specific Models

 

Index of Volume 38

Index

Volume 38, No. 3, 2006 - Contents

Sidney A. Morris
Editorial  

Hua-Yang Lin, Ping-Yu Hsu and Ping-Ho Ting

ERP Systems Success: An Integration of IS Success Model and Balanced Scorecard

 

Ahsan Abdullah and Amir Hussain

Data Mining a New Pilot Agriculture Extension Data Warehouse

 

Qingyuan Bai, Jun Hong, Michael F. McTear and Hui Wang

A Bucket-Based Approach to Query Rewriting Using Views in the Presence of Inclusion Dependencies

 

Xie Li and Wenjun Zhang

A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS

Volume 38, No. 2, 2006 - Contents

Sidney A. Morris
Editorial  

Zhonglong Zheng, Jie Yang, and Yitan Zhu

Face Detection and Recognition using Colour Sequential Images

 

Hazem M. El-Bakry and Qiangfu Zhao

Fast Normalized Neural Processors for Pattern Detection Based on Cross Correlation Implementation in the Frequency Domain

 

Devarajan Gopal and Taye Abdulkadir

Self-Similarity and Internet Performance

 

KwangJin Park

An Efficient Data Dissemination Scheme for Nearest Neighbour Query Processing

 

Ying-Han Pang, Andrew B.J. Teoh, and David C.L. Ngo

A Discriminant Pseudo Zernike Moments in Face Recognition

Volume 38, No. 1, 2006 - Contents

Julio César Hernández Castro
Guest Editorial  

Chunxiao Ye, Zhongfu Wu, and Yunqing Fu

An Attribute-Based Delegation Model and Its Extension

 

Siraj Shaikh and Vicky Bush

Analysing the Woo-Lam Protocol Using CSP and Rank Functions

 

Rodolfo Villarroel, Eduardo Fernández-Medina, and Mario Piattini

A UML 2.0/OCL Extension for Designing Secure Data Warehouses

 

Wes Sonnenreich, Jason Albanese, and Bruce Stout

Return On Security Investment (ROSI) – A Practical Quantitative Modell

 

Carlos Gutiérrez, Eduardo Fernández-Medina, and Mario Piattini

Towards a Process for Web Services Security

 

Guangsen Zhang and Manish Parashar

Cooperative Defence Against DDoS Attacks

 

Claudine Conrado, Milan Petkovic, Michiel van der Veen, and Wytse van der Velde

Controlled Sharing of Personal Content Using Digital Rights Management

 

Vaibhav Gowadia and Csilla Farkas

Tree Automata for Schema-Level Filtering of XML Associations

 

Khaled Alghathbar, Csilla Farkas, and Duminda Wijesekera

Securing UML Information Flow Using FlowUML

Volume 37, No. 4, 2005 - Contents

Sidney A. Morris
Editorial  

Karl H. Hofmann and Sidney A. Morris

Editor's Cut: Managing Scholarly Journals in Mathematics and IT

 

Andrew Rae and Colin Fidge

Identifying Critical Components During Information Security Evaluations

 

Mohamad Eid, Hassan Artail, Ayman Kayssi, and Ali Chehab

Trends in Mobile Agent Applications

 

Xiaoming Wu, Fang Lu, Bo Wang, and Jingzhi Cheng

Analysis of DNA Sequence Pattern Using Probabilistic Neural Network Model

 

A.A. Akintola, G.A. Aderounmu, A.U. Osakwe, and M.O. Adigun

Performance Modeling of an Enhanced Optimistic Locking Architecture for Concurrency Control in a Distributed Database System

 

Hye-Young Kim and Chong-Sun Hwang

An Efficient Location Management Scheme for the Same Mobility Nodes Group in Network Mobility

 

Renyi Zhao and V. Lakshmi Narasimhan

An Event Algebra Based System for Verifying E-Commerce Transactions

 

Index of Volume 37

Index

Volume 37, No. 3, 2005 - Contents

Sidney A. Morris
Editorial  

Chad Lin, Graham Pervan, and Donald McDermid

IS/IT Investment Evaluation and Benefits Realization Issues in Australia

 

Aybuke Aurum, Claes Wohlin, and Hakan Petersson

Increasing the Understanding of Effectiveness in Software Inspections Using Published Data Sets

 

Darin Chan and John F. Roddick

Summarisation for Mobile Databases

 

Manoranjan Paul and Manzur Murshed

Advanced Very Low Bit Rate Video Coding Using Preferential Pattern Selection Algorithms

Volume 37, No. 2, 2005 - Contents

Sidney A. Morris
Editorial  

Phyl Webb and Judy Young

Perhaps Its Time for a Fresh Approach to ICT Gender Research?

 

Christine O'Keefe, Paul Greenfield, and Andrew Goodchild

A Decentralised Approach to Electronic Consent and Health Information Access Control

 

Young-Chang Hou and Shu-Fen Tu

A Visual Cryptographic Technicque for Chromatic Images Using Multi-Pixel Encoding Method

 

Anthony Tang, Michael Boyle, and Saul Greenberg

Understanding and Mitigating Display and Presence Disparity in Mixed Presence Groupware

 

Gongde Guo, Hui Wang, and David Bell

Similarity-Based Data reduction Techniques

Volume 37, No. 1, 2005 - Contents

Sidney A. Morris
Editorial  

Alex Zelinsky

Reinventing ICT Research

 

Hugh Roberts and Shirley Gregor

Why Australian Merchants Aren't Adopting E-Money

 

Bruce Armstrong, Gerard Fogarty, Don Dingsdag and Julian Dimbleby

Validation of a Computer User Satisfaction Questionnaire to Measure IS Success in Small Business

 

Heping Pan, Chandima Tilakaratne and John Yearwood

Predicting Australian Stock Market Index Using Neural Networks Exploiting Dynamical Swings and Intermarket Influences

 

Michelle O'Brian and John Yearwood

Decisions Surrounding Adverse Drug Reaction Prescribing: Insights from Consumers and Implications for Decision Support

 

Ranadhir Ghosh and Moumita Ghosh

An Intelligent Offline Handwriting Recognition System Using Evolutionary Neural Learning Algorithm and Rule Based Over Segmented Data Points

 

Robert Dale, Sabine Geldof and Jean-Philippe Prost

Using Natural Language Generation in Automatic Route Description

 

Stuart Norcross, Ron Morrison, Dave Munro, Henry Detmold and Katrina Falkner

Implementing a Family of Distributed Garbage Collectors

 

Saeed Parsa and Omid Busherian

A New Encoding Scheme and a Framework to Investigate Genetic Clustering Algorithms

Volume 36, No. 4, 2004 - Contents

Didar Zowghi
Guest Editorial  

Karl Cox, Aybuke Aurum and Ross Jeffery

An Experiment in Inspecting the Quality of Use Case Descriptions

 

Marisol Sanchez-Alonso, Juan M. Murillo and Juan Hernandez

COFRE: Environment for Specifying Coordination Requirements using Formal, and Graphical Techniques

 

Beatriz Bernardez, Amadore Duran and Marcela Genero

Empirical Evaluation and Review of a Metrics-Based Approach for Use Case Verification

 

Steven J. Bleistein, Aybuke Aurum, Karl Cox and Pradeep K. Ray

Strategy-Oriented Alignment in Requirements Engineering: Linking Business Strategy to Requirements of e-Business Systems using the SOARE Approach

 

Paolo Donzelli and Paolo Bresciani

Improving Requirements Engineering by Quality Modelling - A Quality-Based Requirements Engineering Framework

 

Javier Andrade, Juan Ares, Santiago Rodriguez, Francisco J. Lopez, Juan Pazos and Andres Sliva

Computer-Assisted Discrepancy Management - A Case Study in Research Transfer to Industry

 

Index of Volume 36

Index

 

Volume 36, No. 3, 2004 - Contents

Sidney A. Morris
Editorial  

Jinyan Li and Hwee-Leng Ong

Feature Space Transformation for Better Understanding Biological and Medical Classifications

 

Nam Hee Lee and Sung Deok Cha

Generating Reduced Finite State Machine from Concurrent Scenarios Using Static Partial Order Method

 

Golam Sorwar, Manzur Murshed and Laurence Dooley

Fast Block-Based True Motion Estimation Using Distance Dependent Thresholds

 

Namgyu Kim Songchun Moon and Yonglak Sohn

Application of Unique View Consistency for Elimination of Covert Channels in Real-Time Secure Transaction Processing Systems

 

Yan Jin, Charles Lakos and Robert Esser

Modular Consistency Analysis of Component-Based Design

 

Volume 36, No. 2, 2004 - Contents

Sidney A. Morris
Editorial  

Sheng-Uei Guan, Sin Lip Tan and Feng Hua

A Modularized Electronic Payment System for Agent-based E-commerce

 

Jeffrey Xu Yu, Chi-Hon Choi, Gang Gou and Hongjun Lu

Selecting Views with Maintenance Cost Constraints: Issues, Heuristics and Performance

 

O. Sorebo, G.E. Christensen and T.R. Eikebrokk

The Impact of Purposeful End-User Computing Activities on Job Performance: An Empirical Investigation

 

Keyur Patel: Book Review of Mohini Singh and Dianne Waddell editors

E-Business Innovations and Change Management

 

Volume 36, No. 1, 2004 - Contents

Sidney A. Morris
Editorial  

Chih-Chien Wang

Sender and Receiver Addresses as Cues for Anti-Spam Filtering

 

Mohamed Ahmed-Nacer

Evolution of Software Processes and of their Models: A Multiple Strategy Approach

 

L. Wookey and J. Geller

Semantic Hierarchical Abstraction of Web Site Structures for Web Searchers

 

Steven Guan and Fangming Zhu

Ontology Acquisition and Exchange of Evolutionary Product-brokering Agents

 

Andrew Teoh, S.A. Samad and A. Hussain

Nearest Neighbourhood Classifiers in a Bimodal Biometric Verification System Fusion Decision Scheme

 

Volume 35, No. 4, 2003 - Contents

Sidney A. Morris
Editorial

Bill Appelbe
The Future of Open Source Software

Shichao Zhang and Chengqi Zhang
A Probability Data Model and its Semantics

Jim M. Ng, Chor Ping Low and Ruth N. Susilo
Determination of the Availability of a Shared Backup Channel

Abdul Halim Zaim
A Markov Model to Calculate New and Hand-off Call Blocking Probabilities in LEO Satellite Networks

Ngamnij Arch-int, Peraphon Sophatsathit and Yuefeng Li
Ontology-based Metadata Dictionary for Integrating Heteregeneous Information Sources on the WWW

Index for Volume 35 (2003)




Volume 35, No. 3, 2003 - Contents

Sid Morris
Editorial

M. de Raadt, R. Watson and M. Toleman
Introductory Programming Languages at Australian Universities at the Beginning of the Twenty First Century

Sharyn Ch'ang and Marina Yastrebroff
Intellectual Property Auditing: A Road to Riches

Lisa Bowman
The Story of an Australian dot.com Company that Survived the Tech Wreck

S.L. D. Ah-Fock and A.L.M. Cavaye
The Effect of Reusability on Perceived Competitive Performance of Australian Software Firms

Somjai Boonsiri, Robert C. Seacord and David A. Mundie
Rule-Based COTS Integration

J. Van Akkeren and D. Harker
The Mobile Internet and Small Business: An Exploratory Study of Needs, Uses and Adoption with Full-Adoptors of Technology

Book Review by Danny Yee
Martin Campbell-Kelly
From Airline Reservations to Sonic the Hedgehog - A History of the Software Industry




Volume 35, No. 2, 2003 - Contents

Linda Bird, Sam Heard, and Jim Warren
Guest Editorial- Special Issue - Knowledge Management in Healthcare

Bryn Lewis
From Narrative Therapeutic Guidelines to Decision Support: Design for Production Efficiency and Safety

Kemafor Anyanwu, Amit Sheth, Jorge Cardoso, John Miller and Krys Kochut
Healthcare Enterprise Process Development and Integration

Tiziana Catarci, Guiseppe Santucci and Sonia Fernandes Silva
An Interactive Visual Exploration of Medical data for Evaluating Health Centres

L. Bird, A. goodchild and Z. Tun
Experiences with a Two-Level Modelling Approach to Electronic Health Records

Quddus Chong, Anup Marwadi, Kaustubh Supekar and Yugyung Lee
Ontology Based Metadata Management in Medical Domains




Volume 35, No. 1, 2003 - Contents

Sid Morris
Editorial

Carlo Cappuccio and Sigi Goode
Australian Business After the Dotcom Bubble: Initial Findings

Eileen M. Trauth, Susan Nielsen and Liisa von Hellens
Explaining the IT Gender Gap: Australian Stories for the New Millenium

Peter J. Mangan and Shazia Sadiq
A Constraint Specification Aproach to Building Flexible Workflows

Trent W. Lewis and David M.W. Powers
Audio-Visual Speech Recognition using Red Exclusion and Neural Networks