Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CT Reconstruction Using FBP with Sinusoidal Amendment for Metal Artefact Reduction., , and . DICTA, page 439-448. CSIRO Publishing, (2003)A mathematical model for spatial orientation from pictorial perspective displays., , and . IEEE Trans. Systems, Man, and Cybernetics, 18 (3): 425-437 (1988)Applying Evolution Program Techniques to Constrained Continuous Optimal Control Problems., and . International Conference on Evolutionary Computation, page 285-290. (1996)Automated Assignment of Backbone Resonances Using Residual Dipolar Couplings Acquired from a Protein with Known Structure., , , and . BIOCOMP, page 646-652. CSREA Press, (2008)Array Design and Expression Evaluation in POOMA II., , , , , , , and . ISCOPE, volume 1505 of Lecture Notes in Computer Science, page 231-238. Springer, (1998)Retrieving relevant information: traditional file systems versus tagging., and . J. Enterprise Inf. Management, 25 (1): 79-93 (2012)Behavioural Affect and Cognitive Effects of Time-pressure and Justification Requirement in Software Acquisition: Evidence from an Eye-Tracking Experiment., and . AMCIS, Association for Information Systems, (2014)Moving Towards Information System Security Accreditation within Australian State Government Agencies., , , and . AMCIS, page 46. Association for Information Systems, (2008)Building a Taxonomy for Cybercrimes., , and . PACIS, page 109. (2013)The Development of Theoretical Framework for In-App Purchasing for the Gaming Industry., , , and . PACIS, page 30. (2015)