default search action
Search dblp for Publications
export results for "toc:db/journals/acj/acj31.bht:"
@article{DBLP:journals/acj/AshleyBV99, author = {Paul Ashley and Bradley Broom and Mark Vandenwauver}, title = {An Implementation of a Secure Version of {NFS} including {REBAC}}, journal = {Aust. Comput. J.}, volume = {31}, number = {2}, pages = {54--64}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/AshleyBV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/AtkinsonL99, author = {Doug Atkinson and Angela Lam}, title = {A Case Study Exploration of Groupware Supported Workflow}, journal = {Aust. Comput. J.}, volume = {31}, number = {4}, pages = {124--130}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/AtkinsonL99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/Boles99, author = {Wageeh W. Boles}, title = {Recognising 2D Object Contours in 3D Space Using Wavelet Transform}, journal = {Aust. Comput. J.}, volume = {31}, number = {1}, pages = {17--26}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/Boles99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/Dowling99, author = {Carolyn Dowling}, title = {Minding our manners: Public and Private Disclosure Within Electronic Environments}, journal = {Aust. Comput. J.}, volume = {31}, number = {3}, pages = {89--93}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/Dowling99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/Fisher99, author = {Julie Fisher}, title = {The Importance of User Message Text and Why Professional Writers Should Be Involved}, journal = {Aust. Comput. J.}, volume = {31}, number = {4}, pages = {118--123}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/Fisher99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/GammackG99, author = {John G. Gammack and Peter R. Goulding}, title = {Ethical Responsibility and the Management of Knowledge}, journal = {Aust. Comput. J.}, volume = {31}, number = {3}, pages = {72--77}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/GammackG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/GiannoccaroSD99, author = {Anthony Giannoccaro and Graeme G. Shanks and Peta Darke}, title = {Stakeholder Perceptions of Data Quality in a Data Warehouse Environment}, journal = {Aust. Comput. J.}, volume = {31}, number = {4}, pages = {110--116}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/GiannoccaroSD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/GolicCD99, author = {Jovan Dj. Golic and Andrew J. Clark and Ed Dawson}, title = {Inversion Attack and Branching}, journal = {Aust. Comput. J.}, volume = {31}, number = {2}, pages = {44--53}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/GolicCD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/JefferyZ99, author = {D. Ross Jeffery and Benjamin Zucker}, title = {The State of Practice in the Use of Software Metrics}, journal = {Aust. Comput. J.}, volume = {31}, number = {1}, pages = {9--16}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/JefferyZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/JohnstonA99, author = {S. W. Johnston and G. A. Acquaah{-}Gaisie}, title = {Computers and Human Rights: Toward a {UN} Code of Computer Ethics}, journal = {Aust. Comput. J.}, volume = {31}, number = {3}, pages = {94--98}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/JohnstonA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/MartinPSW99, author = {Keith M. Martin and Josef Pieprzyk and Reihaneh Safavi{-}Naini and Huaxiong Wang}, title = {Changing Thresholds in the Absence of Secure Channels}, journal = {Aust. Comput. J.}, volume = {31}, number = {2}, pages = {34--43}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/MartinPSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/Morris99, author = {E. J. S. Morris}, title = {A Cyberspace Ethics Methodology}, journal = {Aust. Comput. J.}, volume = {31}, number = {3}, pages = {83--88}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/Morris99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/Nielson99, author = {Sue H. Nielsen}, title = {Talking About Change: An Analysis of Participative Discourse Amongst {IT} Operations Personnel}, journal = {Aust. Comput. J.}, volume = {31}, number = {4}, pages = {102--109}, year = {1999}, timestamp = {Wed, 20 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/Nielson99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/RobertsW99, author = {Paul Roberts and Jenny Webber}, title = {Visual Truth in the Digital Age: Towards a Protocol for Image Ethics}, journal = {Aust. Comput. J.}, volume = {31}, number = {3}, pages = {78--82}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/RobertsW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/Thorne99, author = {Fiona Thorne}, title = {Costs and Benefits of Reuse}, journal = {Aust. Comput. J.}, volume = {31}, number = {1}, pages = {1--8}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/Thorne99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/Wood-HarperCBH99, author = {A. T. Wood{-}Harper and Steve Corder and B. Byrne and Jim Hughes}, title = {Ethically Situated Information Systems Development}, journal = {Aust. Comput. J.}, volume = {31}, number = {3}, pages = {66--71}, year = {1999}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/Wood-HarperCBH99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.