List of Subject Classifications Records

Browse Results (147 results found)

Subscribe to the RSS feed for this result setSubscribe to the RSS feed for this result set

Page 1 of 3

Result Pages:    1 2 3  next › last »

 Browse by Socio-Economic Objective (1998) The SEO Classification allows R&D data to be classified according to the researcher's perceived purpose. The purpose categories take account of processes, products, health, education and other social and environmental aspects of particular interest. -> Division 2 - Economic Development -> 700000 - Information and Communication Services -> 700100 Computer Software and Services -> 700102 Application tools and system utilities :

No further child subject classifications could be found.
  Abstract Views File Downloads Thomson Reuters Web of Science Citation Count Scopus Citation Count Altmetric Score
Robinson, R. R. and Indulska, J. (2004). A complex systems approach to service discovery. In: D. Azada, Proceedings of the Fifteenth International Workshop on Database and Expert Systems Applications (DEXA 2004). The Fifteenth International Workshop on Database and Expert Systems Applications (DEXA 2004), Zaragoza, Spain, (657-661). 30 August-3 September 2004. doi:10.1109/DEXA.2004.1333549 87   0 0
Pettit, C. (1999). A conceptual model for a regional integrated planning system. In: The 2nd International Conference on Multiple Objective Decision Support Systems Proceedings. , Brisbane, (). 1-6 Aug, 1999. 123  
Xu, Dongming, Wang, Huaiqing and Wang, Minhong (2005) A conceptual model of personalized virtual learning environments. Expert Systems With Applications, 29 3: 525-534. doi:10.1016/j.eswa.2005.04.028 273 457 11 Cited 17 times in Scopus17 0
Shukla, Rakesh, Strooper, Paul and Carrington, David (2007) A framework for statistical testing of software components. International Journal of Software Engineering And Knowledge Engineering, 17 3: 379-405. doi:10.1142/S021819400700329X 149   0 Cited 0 times in Scopus0 0
Lindsay, P. A., Macdonald, A. J., Staples, M. and Strooper, P. A. (2001) A framework for subsystem-based configuration management. SVRC Tech Report 01-05, Software Verification Research Centre, School of Information Technology, The University of Queensland. 42  
Watson, Geoffrey Norman (2001). A Generic Proof Checker PhD Thesis, School of Computer Science and Electrical Engineering, The University of Queensland. 799 1428
Hunter, Chris, Robinson, Peter J. and Strooper, Paul A. (2005). Agent-based distributed software verification. In: V. Estivill-Castro, Proceedings of the twenty eighth Australasian Computer Science Conference (ACSC 2005) Newcastle, Australia, January, 2005. Twenty Eighth Australasian Computer Science Conference (ACSC 2005), Newcastle, NSW, (159-164). 30 January - 2 February, 2005. 61  
Long, Brad, Strooper, Paul and Wildman, Luke (2007) A method for verifying concurrent Java components based on an analysis of concurrency failures. Concurrency and Computation, 19 3: 281-294. doi:10.1002/cpe.1063 106 1 4 Cited 9 times in Scopus9 0
Cerone, A. and Milne, G. (2000). A methodology for the formal analysis of asynchronous micropipelines. In: W. A. Hunt and S. D. Johnson, Third International Conference on Formal Methods in Computer-Aided Design (FMCAD00). Formal Methods in Computer-Aided Design (FMCAD00), Austin, Texas, USA, (246-262). 1-3 November 2000. 32  
Brockmans,, Colomb, R M, Haase,, Kendall,, Wallace,, Welty, and Xie, T. (2006). A model driven approach for building OWl Dl and OWL Full Ontologies. In: I. Cruz, S. Decker, D. Allemang, C. Priest, D. Schwabe, P. Mika, M. Uschold and L. Aroyo, 5th International Semantic Web Conference (ISWC2006). 5th International Semantic Web Conference (ISWC2006), Athens, Atlanta, USA, (187-200). 5-9 November, 2006. 46   Cited 7 times in Scopus7
Colomb, R. M. and Dampney, C. N. G. (2005) An approach to ontology for institutional facts in the semantic web. Information And Software Technology, 47 12: 775-783. doi:10.1016/j.infsof.2004.12.002 46   7 Cited 12 times in Scopus12 0
O'Brien, Paul Francis (2006). An architecture for ubiquitous mobile service delivery PhD Thesis, School of Information Technology and Electrical Engineering, The University of Queensland. 307 3
O'Brien, P. F. and Burmeister, J. M. (2002). An architecture for ubiquitous service delivery. In: T. Terano and M. D. Myers, The 6th Pacific Asia Conference on Information Systems: The Next e-What? for Business and Communities. PACIS2002 - The Next e-What for Business and Communities, Meiji University, Tokyo, (11-26). 2-4 September 2002. 54 223
van den Berg, Lionel, Strooper, Paul and Johnston, Wendy (2007). An automated approach to the interpretation of counter-examples. In: Proceedings of the Workshop on Verification and Debugging (V&D 2006). Workshop on Verification and Debugging (V&D 2006), Seattle, WA, United States, (19-35). 21 August 2006. doi:10.1016/j.entcs.2006.12.027 66   Cited 2 times in Scopus2 0
Reeves, M. and Zhu, J. (2004). An awareness model for supporting collaboration in distributed eXtreme programming. In: Hamid R. Arabnia and Hassan Reza, Proceedings of the International Conference on Software Engineering Research and Practice SERP'04. SERP'04 - The 2004 Conference on Software Engineering Research and Practice, Las Vegas, Nevada, U.S.A., (468-474). 21-24 June, 2004. 104  
Robinson, N. J. and Fidge, C. J. (2002). Animation of data refinements. In: P. Strooper and P. Muenchaisri, Ninth Asia-Pacific Software Engineering Conference (APSEC 2002). APSEC 2002, Gold Coast, Australia, (137-146). 4-6 December 2002. 54   2
Pettit, C. and Pullar, D. V. (1999) An integrated planning tool based upon multiple criteria evaluation of spatial information. Computers, Environment and Urban Systems, 23 339-357. 117  
Wojcicki, M. and Strooper, P. A. (2007). An iterative empirical strategy for the systematic selection of a combination of verification and validation technologies. In: B. Boehm, S. Chulani, J. Verner and B. Wong, Proceedings of the Fifth International Workshop on Software Quality (WoSQ 2007). Fifth International Workshop on Software Quality (WoSQ 2007), Minnesota, U.S.A., (). 20-26 May 2007. doi:10.1109/WOSQ.2007.4 67   Cited 0 times in Scopus0 0
Cao, T. H. (2000) Annotated fuzzy logic programs. International Journal of Fuzzy Sets and Systems, 113 2: 277-298. doi:10.1016/S0165-0114(98)00083-9 74   18 0
Gallagher, M. (2002). A nomadic computing architecture for open distributing computing , School of Computer Science and Electrical Engineering, The University of Queensland. 107  
Green, P. F. and Rosemann, M. (1999). An ontological analysis of integrated process modelling. In: M. Jarke and A. Oberweis, Advanced Information Systems Engineering: Proceedings of 11th International Conference, CAiSE*99. 11th International Conference on Advanced Systems Engineering, CAiSE*99, Heidelberg, Germany, (225-240). 14-18 Jun, 1999. 65  
Yesberg, John and Henderson, Marie (2001). Applications of trusted review to information security. In: Vijay Varadharajan, and Yi Mu, Lecture Notes in Computer Science. Information Security and Privacy. 6th Australasian Conference, ACISP 2001, Sydney, New South Wales, (305-319). 11-13 July, 2001. 14  
Havas, G., Soicher, L.H. and Wilson, R.A. (2001). A presentation for the Thompson sporadic simple group. In: W.M. Kantor and A. Seress, Groups and Computation III: Proceedings of the International Conference at the Ohio State University. Groups and Computation, Columbus, Ohio, (193-200). 15-19 June, 2001. 42   3
Colvin, R. and Groves, L. (2007). A scalable lock-free stack algorithm and its verification. In: Mike Hinchey and Tiziana Margaria-Steffen, Proceedings Fifth IEEE International Conference on Software Engineering and Formal Methods. Fifth IEEE International Conference on Software Engineering and Formal Methods, London, United Kingdom, (339-348). 12-14 September 2007. doi:10.1109/SEFM.2007.2 112   2 Cited 4 times in Scopus4 0
Clutterbuck, P. J. and O'Brien, P. F. (2006). A software audit framework for spyware risk mitigation. In: S. Chatterjee and R. Alan Hevner, Proceedings of the 1st International Conference on Design Science Research in Information Systems and Technology. International Conference on Design Science Research in Information Systems and Technology (1st, 2006), Claremont, CA, U.S.A., (461-474). 24-25 February 2006. 101  
Pettit, C. (1999). A spatial decision support system for assisting in the management of socio-economic urban and regional growth and decline. In: E.G. Masters, The Australian Urban and Regional Information Systems Associations. AURISA 99 Meet the Challenge, Blue Mountains, NSW, (). 22-26 November 1999. 92  
Wojcicki, M. A. and Strooper, P A (2006). A state-of-practice questionnaire on verification and validation for concurrent programs. In: L. Polloci and M. Pezze, Proceedings of the ISSTA 2006 Symposium & PADTAD-IV Workshop. Workshop on Parallel and Distributed Systems: Testing and Debugging (PADTAD-IV) 2006, Maine, U.S.A., (1-10). 17 July, 2006. doi:10.1145/1147403.1147405 54   Cited 5 times in Scopus5 0
Voelzer, H. P., Atchison, B., Lindsay, P. A., Macdonald, A. J. and Strooper, P. A. (2002). A tool for subsystem configuration management. In: International Conference on Sotware Maintenance. ICSM 2002, Montreal, Canada, (492-500). 3-6 October, 2002. doi:10.1109/ICSM.2002.1167810 32   1 0
Cerone, A. (2001) A translation of bounded Petri nets into finite state machines Brisbane: Software Verification Research Cen. Univ of Qld 50  
Javed, A. Z., Strooper, P. A. and Watson, G. N. (2007). Automated generation of test cases using model-driven architecture. In: H. Zhu, E. Wong and A. Paradkar, Automation of Software Test 2007 (AST '07). Second International Workshop on Automation of SoftwareTest 2007 (AST '07), Minnesota, U.S.A., (). 20-26 May 2007. doi:10.1109/AST.2007.2 129   Cited 0 times in Scopus0 0
Petrovsky, N. and Brusic, V (2006) Bioinformatics for study of autoimmunity. Autoimmunity, 39 8: 635-643. doi:10.1080/08916930601062437 72   11 Cited 14 times in Scopus14 0
Kayed, A. and Colomb, R. M. (2001). Business to business electronic commerce: Electronic tendering. In S. Rahman and R. Bignall (Ed.), Internet Commerce and Software Agents: Cases, Technologies and Opportunities (pp. 231-250) Hershey, PA: Idea Group Publishing. 52  
Colvin, Robert, Hayes, Ian J. and Strooper, Paul A. (2008) Calculating modules in contextual logic program refinement. Theory and Practice of Logic Programming, 8 1: 1-31. doi:10.1017/S1471068407003043 72   0 Cited 0 times in Scopus0 0
Devereux, Drew (2003). Capability-based Description and Discovery of Services PhD Thesis, School of Information Technology and Electrical Engineering, The University of Queensland. 148 1
Colomb, Robert M., Dampney, C.N.G. and Johnson, Michael (2001) Category-theoretic fibration as an abstraction mechanism in information systems. Acta Informatica, 38 1: 1-44. doi:10.1007/PL00013321 55   8 Cited 9 times in Scopus9 0
Havas, G., Holt, D. F. and Newman, M. F. (2001) Certain cyclically presented groups are infinite. Communications In Algebra, 29 11: 5175-5178. 48   0
Robinson, N. J. (2001) Checking Z data refinements using an animation tool Brisbane: Software Verification Research Cen. Univ of Qld 38  
Robinson, P. J. and Shankland, C (2003). Combating infinite state using ergo. In: H. Konig, M Heiner and A. Wolisz, Formal Techniques for Networked and Distributed Systems: FORTE 2003. The 23rd International Conference on Formal Techniques for Networked and Distributed Systems, Berlin, (144-159). 29th September-2nd October, 2003. 43   0
Pong, Peter (2000). Combined active and passive millimetre wave sensor for ground-based imaging Master's Thesis, School of Computer Science and Electrical Engineering, The University of Queensland. 84  
Ngui, J., Strooper, P. A., Wildman, L. and Wojcicki, M. (2007). Comparing the cost-effectiveness of statically analysing and model checking concurrent java components for deadlocks. In: J. Grundy and J. Han, Proceedings of the 2007 Australian Software Engineering Conference (ASWEC '07). 18th Australian Conference on Software Engineeing (ASWEC '07), Melbourne, Australia, (223-232). 10-13 April 2007. doi:10.1109/ASWEC.2007.16 81   0 Cited 2 times in Scopus2 0
Cifuentes, C., Waddington, T. and Van Emmerik, M. J. (2001). Computer security analysis through decompilation and high-level debugging. In: E. Burd, P. Aitken and R. Koschke, Proceedings of the Eighth Working Conference on Reverse Engineering. Eighth Working Conference on Reverse Engineering, Stuttgart, Germany, (375-380). 2-5 October, 2001. 43   1
Kayed, A. and Colomb, R. M. (2001). Conceptual structures for tendering ontology. In: R. Kowalczyk, R. Loke, S.W. Reed and G.J. Williams, Advances in Artificial Intelligence: PRICAI 2000 Workshop Reader. Pacific Rim Conference on Artificial Intelligence 2000, Melbourne, (135-146). 16 August-1 September 2000. 35  
Chen, P. and Colomb, R. M. (2003) Database technologies for l-system simulations in virtual plant applications on bioinformatics. Knowledge and Information Systems, 5 3: 288-314. doi:10.1007/s10115-002-0087-0 53   0
Wildman, Luke, Long, Brad and Strooper, Paul (2005). Dealing with non-determinism in testing concurrent java components. In: J. Lee, W.C. Chu and P. Jalote, Proceedings: Asia-Pacific Software Engineering Conference. 12th Asia-Pacific Software Engineering Conference (APSEC 2005), Taipei, Taiwan, (393-400). 15-17 December 2005. doi:10.1109/APSEC.2005.58 77   0 Cited 3 times in Scopus3 0
Chen, Y. and Colomb, R. M. (1999). Decision support in bioinformatics research for virtual plants. In: F Burstein, Proceedings of the International Society for Decision Support Systems Fifth International Conference. ISDSS'99, Melbourne, (1-9). 20-23 July 1999. 32  
Bucolo, S. and Brereton, M. F. (2004). Design activity within immersive design environments. In: M. Agger Eriksen, L. Malmborg and J. Nielsen, Proceedings of the First European Conference on Computers in Art and Design Education. The First European Conference on Computers in Art and Design Education, Copenhagen, (1-8). 29 June-1 July, 2004. 69  
Jarrott, D. P. and Macdonald, A. J. (2003). Developing relational navigation to effectively understand software. In: P. Muenchaisri and D. Bae, Proceedings of the Tenth Asia-Pacific Software Engineering Conference. The Tenth Asia-Pacific Software Engineering Conference, Chiang Mai, Thailand, (144-153). 10-12 December 2003. doi:10.1109/APSEC.2003.1254367 36   0
Chen, Y. (1999). DML: A bridge between database systems and L-systems for biological research. In: Z. M. Ozsoyoglu, G. Ozsoyoglu and W-C. Hou, Proceedings Eleventh International Conference on Scientific and Statistical Database Management. SSDBM 11, Cleveland Ohio, USA, (285-285). 28-30 July 1999. 33  
Muhlberger, R. M. (2003). Dynamic database generation for mobile applications. In: A. Olive, M. Yoshikawa and E. Yu, Proceedings of the Workshop on Conceptual Modelling Approaches to Mobile Information Systems Development. he Workshop on Conceptual Modelling Approaches to Mobile Information Systems Development, Tampere, Finland, (195-204). 7-11 October, 2002. 35  
Marjanovic, Olivera (2000). Dynamic verification of temporal constraints in production workflows. In: Maria E. Orlowska, Proceedings of the IEEE: 11th Australasian Database Conference (ADC 2000). ADC 2000, Canberra, (74-81). 31 January - 3 February 2000. doi:10.1109/ADC.2000.819816 36   0

Page 1 of 3

Result Pages:    1 2 3  next › last »