Your selections:
BIM: expectations and a reality check
- Singh, Vishal, Gu, Ning, London, Kerry, Brankovic, Ljiljana, Taylor, Claudelle
- Singh, Vishal, Gu, Ning, London, Kerry, Brankovic, Ljiljana, Taylor, Claudelle
Hard theorems made easier: visualisation and interactivity
- Reynolds, Michael, Brankovic, Ljiljana
Comparative study of data mining techniques for predicting explosions in coal mines
- Namazi, Samira, Brankovic, Ljiljana, Moghtaderi, Behdad, Zanganeh, Jafar
Predicting Deflagration and Detonation in Detonation Tube
- Namazi, Samira, Brankovic, Ljiljana, Moghtaderi, Behdad, Zanganeh, Jafar
- London, Kerry A., Singh, Vishal, Gu, Ning, Taylor, Claudelle, Brankovic, Ljiljana
Building information modelling project decision support framework
- London, Kerry, Singh, Vishal, Taylor, Claudelle, Gu, Ning, Brankovic, Ljiljana
- King, Tatiana, Brankovic, Ljiljana, Gillard, Patricia
Privacy preserving data mining: a noise addition framework using a novel clustering technique
- Islam, Md Zahidul, Brankovic, Ljiljana
Adopting building information modeling (BIM) as collaboration platform in the design industry
- Gu, Ning, Singh, Vishal, London, Kerry, Brankovic, Ljiljana, Taylor, Claudelle
BIM adoption: expectations across disciplines
- Gu, Ning, Singh, Vishal, Taylor, Claudelle, London, Kerry A., Brankovic, Ljiljana
Industry perception of BIM adoption in design sector
- Gu, Ning, Singh, Vishal, Tsai, Jerry, Taylor, Claudelle, London, Kerry, Brankovic, Ljiljana
Building information modelling: what is in there for the architects?
- Gu, Ning, Singh, Vishal, Londion, Kerry, Brankovic, Ljiljana, Taylor, Claudelle
Statistical disclosure control: to trust or not to trust
- Giggins, Helen, Brankovic, Ljiljana
VICUS - A noise addition technique for categorical data
- Giggins, Helen, Brankovic, Ljiljana
Ethical and privacy issues in genetic databases
- Giggins, Helen, Brankovic, Ljiljana
On the linearity of cryptographic sequence generators
- Fuster-Sabater, Amparo, Delgado-Mohatar, Oscar, Brankovic, Ljiljana
An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks
- Delgado-Mohatar, Oscar, Sierra, José M., Brankovic, Ljiljana, Fúster-Sabater, Amparo
Multi-guarded safe zone: an effective technique to monitor moving circular range queries
- Cheema, Muhammad Aamir, Brankovic, Ljiljana, Lin, Xuemin, Zhang, Wenjie, Wang, Wei
Continuous monitoring of distance-based range queries
- Cheema, Muhammad Aamir, Brankovic, Ljiljana, Lin, Xuemin, Zhang, Wenjie, Wang, Wei
Are you sure you would like to clear your session, including search history and login status?