Abstract is missing.
- Mining autograding data in computer science educationVincent Gramoli, Michael A. Charleston, Bryn Jeffries, Irena Koprinska, Martin McGrane, Alex Radu, Anastasios Viglas, Kalina Yacef. 1 [doi]
- Exploring students' learning attributes in consecutive lessons to improve prediction performanceShaymaa E. Sorour, Tsunenori Mine. 2 [doi]
- Academic integrity and computing assessmentsSimon, Judy Sheard. 3 [doi]
- Attendance and grades in learning programming classesWen-Chin Hsu, Scott W. Plunkett. 4 [doi]
- Factors influencing university students' self-regulation of learning: an exploratory studyRohini Balapumi, Brian R. von Konsky, Ashley Aitken, David A. McMeekin. 5 [doi]
- Comparing international indicators of student engagement for computer scienceMatthew Butler, Jane Sinclair, Michael Morgan, Sara Kalvala. 6 [doi]
- Reflection is hard: teaching and learning reflective practice in a software studioJulia Prior, Samuel Ferguson, John Leaney. 7 [doi]
- Student difficulties with pointer concepts in CMichelle Craig, Andrew Petersen. 8 [doi]
- Combining unsupervised and invigilated assessment of introductory programmingDonna Teague, Colin J. Fidge, Yue Xu. 9 [doi]
- Rubrics used in peer assessmentSam Kavanagh, Andrew Luxton-Reilly. 10 [doi]
- Automatically assessed electronic exams in programming coursesTeemu Rajala, Erkki Kaila, Rolf Lindén, Einari Kurvinen, Erno Lokkila, Mikko-Jussi Laakso, Tapio Salakoski. 11 [doi]
- Pizza with university ICT students: what do students' expect employers want from them?Angela Carbone, Margaret Hamilton. 12 [doi]
- Industry expectations of soft skills in IT graduates: a regional surveyMatt Stevens, Richard Norman. 13 [doi]
- Unpacking 'digital competency': exploring the pre-existing skills of enabling education studentsPhillipa Sturgess, Michael Cowling, Michelle Gray. 14 [doi]
- On gamification in action learningOvidiu Noran. 15 [doi]
- Can you learn to teach programming in two days?Patricia Haden, Joy Gasson, Krissi Wood, Dale Parsons. 16 [doi]
- Is computing for social good the solution to closing the gender gap in computer science?Nazish Zaman Khan, Andrew Luxton-Reilly. 17 [doi]
- Efficient error localisation and imputation for real-world census data using SMTDaniel Alarcón, Rajeev Goré. 18 [doi]
- EDTrend: a methodology for trend prediction with emerging and decaying patternsVincent Mwintieru Nofong. 19 [doi]
- Symmetry declarations for MiniZincNathaniel Baxter, Geoffrey Chu, Peter J. Stuckey. 20 [doi]
- TreeTags: bringing tags to the hierarchical file systemNehad Albadri, Richard Watson, Stijn Dekeyser. 21 [doi]
- A network forensics tool for precise data packet capture and replay in cyber-physical systemsJack Parry, Daniel Hunter, Kenneth Radke, Colin J. Fidge. 22 [doi]
- An efficient parallel algorithm for the maximum convex sum problemSung Eun Bae, Tong-Wook Shinn, Tadao Takaoka. 23 [doi]
- 4s and permutation graphsWing-Kai Hon, Ton Kloks, Hsiang Hsuan Liu. 24 [doi]
- Hardness and tractability of detecting connected communitiesVladimir Estivill-Castro, Mahdi Parsa. 25 [doi]
- P-Scheduler: adaptive hierarchical scheduling in apache stormLeila Eskandari, Zhiyi Huang, David Eyers. 26 [doi]
- Adapting a knowledge-based schema matching system for ontology mappingSarawat Anam, Yang Sok Kim, Byeong Ho Kang, Qing Liu. 27 [doi]
- What is in our datasets?: describing a structure of datasetsMarshima Mohd Rosli, Ewan D. Tempero, Andrew Luxton-Reilly. 28 [doi]
- A genetic programming approach to distributed execution of data-intensive web service compositionsYang Yu, Hui Ma, Mengjie Zhang. 29 [doi]
- Bicluster detection using strength pareto front evolutionary algorithmMaryam Golchin, Alan Wee-Chung Liew. 30 [doi]
- Market-sentiment boosted predictions on multi-type time-seriesVictor W. Chu, Raymond K. Wong, Fang Chen, Ivan Ho, Joe Lee. 31 [doi]
- VOTOR: conceptually simple remote voting against tiny tyrantsThomas Haines, Xavier Boyen. 32 [doi]
- Forgery attacks on ++AE authenticated encryption modeHassan Qahur Al Mahri, Leonie Ruth Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong. 33 [doi]
- Initialisation flaws in the A5-GMR-1 satphone encryption algorithmV. Bhartia, L. Simpson. 34 [doi]
- I know what you did last summer... an investigation into remnant data on USB storage devices sold in Australia in 2015Nikki Robins, Patricia A. H. Williams, Krishnun Sansurooah. 35 [doi]
- Finding state collisions in the authenticated encryption stream cipher ACORNMd. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Ruth Simpson, Ed Dawson, Josef Pieprzyk. 36 [doi]
- Fine-grained classification of side-effect free methods in real-world Java code and applications to software securityArran Stewart, Rachel Cardell-Oliver, Rowan Davies. 37 [doi]
- Measurement of IP and network tracking behaviour of malicious websitesMasood Mansoori, Ian Welch, Seyed Ebrahim Hashemi. 38 [doi]
- DNP3 network scanning and reconnaissance for critical infrastructureNicholas R. Rodofile, Kenneth Radke, Ernest Foo. 39 [doi]
- Effective algorithm for protecting WSNs from internal attacks in real-timeXu Huang, Muhammad Ahmed, Raul Fernandez Rojas, Hongyan Cui, Mohammed Aseeri. 40 [doi]
- Personally controlled & privacy preserving medication management systemBonnie Gambhir, Udaya Parampalli. 41 [doi]
- Wi-Pi: a study of WLAN security in Auckland CBDAr Kar Kyaw, Pulin Agrawal, Brian Cusack. 42 [doi]
- State recovery attacks against π-cipherJoseph Alley, Josef Pieprzyk. 43 [doi]
- Predicting TLS performance from key exchange performance: short paperFarhad Moghimifar, Douglas Stebila. 44 [doi]
- Utilising bitemporal information for business process contingency managementJohn Wondoh, Georg Grossmann, Markus Stumptner. 45 [doi]
- Using a model-driven, knowledge-based approach to cope with complexity in filtering of notices to airmenFelix Burgstaller, Dieter Steiner, Bernd Neumayr, Michael Schrefl, Eduard Gringinger. 46 [doi]
- MCquery: interactive visual query of relational data with coordinating context displaysPhi Giang Pham, Mao Lin Huang. 47 [doi]
- nu-view: a visualization system for collaborative co-located analysis of geospatial disease dataMasood Masoodian, Saturnino Luz, David Kavenga. 48 [doi]
- 3D spirals, bubbles and sliders: setting range values in multi-user 3D environmentsDale Patterson. 49 [doi]
- The aesthetic awareness display: a new design pattern for ambient information systemsBen Shelton, Keith Nesbitt. 50 [doi]
- User intervention in self-adaptive context-aware applicationsKurt Geihs, Christoph Evers. 51 [doi]
- Generating multimedia narrative for virtual humansSteven Wark, Marcin Nowina-Krowicki. 52 [doi]
- Decreasing the digital divide: analysing the UI requirements of older AustraliansCarolyn Seton, Raina Mason. 53 [doi]
- Comparing usability and engagement between a serious game and a traditional online programGeoffrey Hookham, Keith V. Nesbitt, Frances Kay-Lambkin. 54 [doi]
- Surface air hockey: a step towards smart tangiblesKartik Andalam, Kirushi Arunthavasothy, Raoul D'Cunha, Shreya Shah, Andrew Luxton-Reilly, Beryl Plimmer. 55 [doi]
- RTCSS: a framework for developing real-time peer-to-peer web applicationsRoss J. Bille, Yuqing Lin, Stephan K. Chalup. 56 [doi]
- Automatic geospatial data conflation using semantic web technologiesFeiyan Yu, Geoff A. W. West, Lesley Arnold, David McMeekin, Simon Moncrieff. 57 [doi]
- State of the art in knowledge extraction from online polls: a survey of current technologiesMartin Stabauer, Georg Grossmann, Markus Stumptner. 58 [doi]
- Delegation of access in an information accountability framework for eHealthDaniel Grunwell, Tony Sahama. 59 [doi]
- Chronicling the patient journey: co-creating value with digital health ecosystemsAlofi Shane Black, Tony Sahama. 60 [doi]
- Patient journey modelling as a policy mapping method: enhancing the understanding of policy analysisRosemary Sayvong, Joanne Curry. 61 [doi]
- Evaluation of tri-axial accelerometery data of falls for elderly through smart phoneGolenur B. Huq, Jim Basilakis, Anthony J. Maeder. 62 [doi]
- Design of a virtual trainer for exergamingLindsay Alexander Shaw, Romain Tourrel, Burkhard C. Wünsche, Christof Lutteroth, Stefan Marks, Jude Buckley. 63 [doi]
- Data integration for mobile wellness apps to support treatment of GDMSarita Pais, Dave Parry, Elaine Rush, Janet Rowan. 64 [doi]
- Eye Atlas: an instructive resource for ophthalmology students and practitionersI.-Yang Huang, Mark Watkin, Ian Warren, Andrew Meads. 65 [doi]
- Adapting graph theory and social network measures on healthcare data: a new framework to understand chronic disease progressionArif Khan, Shahadat Uddin, Uma Srinivasan. 66 [doi]
- Quantifying mood, content and dynamics of health forumsIvan Rivera, Jim Warren, James Curran. 67 [doi]
- Designing for social play in co-located mobile gamesWilliam Goddard, Jayden Garner, Mads Møller Jensen. 68 [doi]
- Understanding players' map exploration stylesChen Si, Yusuf Pisan, Chek Tien Tan. 69 [doi]
- Building apostrophe power: lessons learnt for serious games developmentDaniel Hickmott, Shamus P. Smith, Ross Bille, Elizabeth Burd, Liz Stephens, Erica Southgate. 70 [doi]
- A study on detecting three-dimensional balls using boosted classifiersMitchell Metcalfe, Brendan Annable, Monica Olejniczak, Stephan K. Chalup. 71 [doi]
- Using startle reflex to compare playing and watching in a horror gameKaren L. Blackmore, William Coppins, Keith V. Nesbitt. 72 [doi]
- Towards a typology of metagamesScott Donaldson. 73 [doi]
- Modeling perceived difficulty in game levelsDaniel Wheat, Martin Masek, Chiou Peng Lam, Philip Hingston. 74 [doi]
- Using startle probe to compare affect and engagement between a serious game and an online intervention programGeoffrey Hookham, Frances Kay-Lambkin, Karen Blackmore, Keith V. Nesbitt. 75 [doi]
- Interactive 3D web applications for visualization of world health organization dataDale Patterson. 76 [doi]
- Procedural urban environments for FPS gamesJan Kruse, Ricardo Sosa, Andy M. Connor. 77 [doi]