default search action
ACSW 2017: Geelong, Australia
- Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017, Geelong, Australia, January 31 - February 3, 2017. ACM 2017, ISBN 978-1-4503-4768-6
- Qun Wu, Tian Wang, Yiqiao Cai, Hui Tian, Yonghong Chen:
Rumor restraining based on propagation prediction with limited observations in large-scale social networks. 1:1-1:8 - Xi Zheng, Lei Pan, Erdem Yilmaz:
Security analysis of modern mission critical android mobile applications. 2:1-2:9 - Tingmin Wu, Shigang Liu, Jun Zhang, Yang Xiang:
Twitter spam detection based on deep learning. 3:1-3:8 - Yongqing Jiang, Jinhua Lu, Jingyu Hou, Wanlei Zhou:
TRA: tandem repeat assembler for next generation sequences. 4:1-4:6 - Hui Zheng, Jing He, Yanchun Zhang, Yong Shi:
A fuzzy decision tree approach based on data distribution construction. 5:1-5:10 - Khavee Agustus Botangen, Jian Yu, Michael Sheng:
Towards measuring the adaptability of an AO4BPEL process. 6:1-6:7 - Jiahua Du, Jing He:
Proportioning documents over categories based on word embeddings. 7:1-7:5 - Ahmed Falah, Lei Pan, Mohamed Abdelrazek:
Visual representation of penetration testing actions and skills in a technical tree model. 8:1-8:10 - Ben Shelton, Keith Nesbitt:
Evaluating WaveWatch: an ambient display of web traffic. 9:1-9:9 - Iman Avazpour, John C. Grundy:
Insights into visualizing trajectory recommendation rankings. 10:1-10:4 - Lindsay Alexander Shaw, Burkhard Claus Wünsche, Christof Lutteroth, Jude Buckley, Paul M. Corballis:
Evaluating sensory feedback for immersion in exergames. 11:1-11:6 - Mark Springett, Richard N. Griffiths, Martin Mihajlov:
Issues faced by vision-impaired users of interactive TV search facilities. 12:1-12:9 - Md. Athar Imtiaz, Rachel Blagojevic, Andrew Luxton-Reilly, Beryl Plimmer:
A survey of intelligent digital ink tools use in STEM education. 13:1-13:8 - Garming Sam, Nick Cameron, Alex Potanin:
Automated refactoring of rust programs. 14:1-14:9 - Min-Hsien Weng, Bernhard Pfahringer, Mark Utting:
Static techniques for reducing memory usage in the C implementation of whiley programs. 15:1-15:8 - Shaun Bangay:
Deterministic procedural generation of mesh detail through gradient tiling. 16:1-16:10 - Andrew McCarren, Suzanne McCarthy, Conor O. Sullivan, Mark Roantree:
Anomaly detection in agri warehouse construction. 17:1-17:10 - Michael J. Dinneen, Richard Hua:
Formulating graph covering problems for adiabatic quantum computers. 18:1-18:10 - Daniel Hunter, Jack Parry, Kenneth Radke, Colin J. Fidge:
Authenticated encryption for time-sensitive critical infrastructure. 19:1-19:10 - Richard Watson, Stijn Dekeyser, Nehad Albadri:
Exploring the design space of metadata-focused file management systems. 20:1-20:10 - Harrison She, Ofek Wittenberg, Ian Warren:
An ad hoc broadcasting application by way of mobile devices. 21:1-21:10 - Garry Singh, M. Daud Ahmed:
Effect of coupling on change in open source Java systems. 22:1-22:7 - Kevin Fray, Kerri Morgan, Anthony Wirth, Justin Zobel:
Practical adaptive search trees with performance bounds. 23:1-23:8 - Andrew Conway, Michelle L. Blom, Lee Naish, Vanessa Teague:
An analysis of New South Wales electronic vote counting. 24:1-24:5 - Martin Boissier, Alexander Spivak, Carsten Alexander Meyer:
Improving tuple reconstruction for tiered column stores: a workload-aware ansatz based on table reordering. 25:1-25:10 - Felix Burgstaller, Martin Stabauer, Rebecca Morgan, Georg Grossmann:
Towards customised visualisation of ontologies: state of the art and future applications for online polls analysis. 26:1-26:10 - Houda Zouhaier, Lamjed Ben Said:
Robust scheduling of truck arrivals at a cross-docking platform. 27:1-27:9 - Roopak Sinha, Ayush Narula, John Grundy:
Parametric statecharts: designing flexible IoT apps: deploying android m-health apps in dynamic smart-homes. 28:1-28:8 - Jan Olaf Blech:
Behavioral types for component-based software systems. 29:1-29:10 - Owen Makin, Shaun Bangay:
Orthogonal analysis of StarCraft II for game balance. 30:1-30:4 - Florrie Verity, Dirk Pattinson:
Formally verified invariants of vote counting schemes. 31:1-31:10 - Xi Zheng, Akanksha Bansal, Matthew Lease:
Bullseye: structured passage retrieval and document highlighting for scholarly search. 32:1-32:4 - Nigel Stanger:
Characterising relational view updates using relative information capacity. 33:1-33:10 - John Wondoh, Georg Grossmann, Markus Stumptner:
Dynamic temporal constraints in business processes. 34:1-34:10 - Judith Michael, Heinrich C. Mayr:
Intuitive understanding of a modeling language. 35:1-35:10 - Pengbo Xiu, Jian Yang, Weiliang Zhao:
A change management framework for service based business process. 36:1-36:9 - Jianan Sun, Ping Dong, Yajuan Qin, Tong Xu:
A scalable header compression scheme to improve bandwidth utilization in 5G networks. 37:1-37:8 - Wei Zhong, Yi Zhuang, Jian Sun, Jingjing Gu:
The cloud computing load forecasting algorithm based on wavelet support vector machine. 38:1-38:5 - Mingzhong Wang:
FollowMe if you can: a study of mobile crowd sensing with Pokémon go. 39:1-39:9 - Lei Wu, Longshu Li, Xuejun Li, Futian Wang, Yun Yang:
A novel strategy for efficient temporal verification with intersectant situation in scientific workflow. 40:1-40:5 - Dawei Sun, Shang Gao:
Scalable-DSP: a high scalable distributed storage and processing system for unstructured data in big data environments. 41:1-41:5 - Keshav Sood, Shui Yu, Yong Xiang:
Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems? 42:1-42:6 - Wenbin Zhang, Yuliang Shi, Yongqing Zheng, Lei Liu, Li-zhen Cui:
Resource and performance prediction at high utilization for N-Tier cloud-based service systems. 43:1-43:9 - Yunxiang Zhong, Xuejun Li, Qiang He:
Iterative auction based service selection for multi-tenant service-based systems. 44:1-44:4 - Andrew Przybylski, Kashfia Haque, Paul Beckett:
The Bel array: asynchronous fine-grained reconfigurable co-processing. 45:1-45:4 - Lianyong Qi, Wan-Chun Dou, Xuyun Zhang:
An inverse collaborative filtering approach for cold-start problem in web service recommendation. 46:1-46:9 - Binbin Yong, Zijian Xu, Jun Shen, Huaming Chen, Yan-Shan Tian, Qingguo Zhou:
Neural network model with Monte Carlo algorithm for electricity demand forecasting in Queensland. 47:1-47:7 - Claudio M. de Farias, Luci Pirmez, Flávia Coimbra Delicato, Paulo F. Pires, Wei Li, Albert Y. Zomaya, Emanuele N. de L. F. Jorge, Reyes Juárez-Ramírez:
GROWN: a control and decision system for smart greenhouses using wireless sensor networks. 48:1-48:8 - Michael Scriney, Martin F. O'Connor, Mark Roantree:
Generating cubes from smart city web data. 49:1-49:8 - Jyothi Kunchala, Jian Yu, Sira Yongchareon, Yanbo Han:
Towards merging collaborating processes for artifact lifecycle synthesis. 50:1-50:8 - Khaled Albishre, Yuefeng Li, Yue Xu:
Effective pseudo-relevance for Microblog retrieval. 51:1-51:6 - Xiujuan Xu, Xiaowei Zhao, Fei Xiong, Shimin Shan, Yu Liu:
Content-based emotion classification in online social networks for Chinese Microblogs. 52:1-52:10 - Arshad Khan, Thanassis Tiropanis, David J. Martin:
Crowd-annotation and LoD-based semantic indexing of content in multi-disciplinary web repositories to improve search results. 53:1-53:12 - Alan Woodley, Timothy Chappell, Shlomo Geva, Richi Nayak:
Using web services to fuse remote sensing and multimedia data repositories. 54:1-54:8 - Jie Yang, Jun Ma, Sarah K. Howard, Matthew Ciao, Rangan Srikhanta:
A big data analytic framework for investigating streaming educational data. 55:1-55:4 - Kyaw Kyaw Htat, Patricia A. H. Williams, Vincent McCauley:
Security of ePrescriptions: data in transit comparison using existing and mobile device services. 56:1-56:7 - Arif Khan, Shahadat Uddin, Uma Srinivasan:
Understanding chronic disease comorbidities from baseline networks: knowledge discovery utilising administrative healthcare data. 57:1-57:9 - Daniel Costantin, Krishnun Sansurooah, Patricia A. H. Williams:
Vulnerabilities associated with wi-fi protected setup in a medical environment. 58:1-58:12 - Nathan Poultney, Anthony J. Maeder, Niranjan Bidargaddi:
Characterizing IT-based consumer health artefacts. 59:1-59:5 - Mahmoud Elbattah, Owen Molloy:
Data-driven patient segmentation using K-means clustering: the case of hip fracture care in Ireland. 60:1-60:8 - Natalie Jablonsky, Sophie McKenzie, Shaun Bangay, Tim Wilkin:
Evaluating sensor placement and modality for activity recognition in active games. 61:1-61:8 - Jacqueline D. Bailey, Karen L. Blackmore:
Gender and the perception of emotions in avatars. 62:1-62:8 - Daniel Della-Bosca, Dale Patterson, Scott Roberts:
An analysis of game environments as measured by fractal complexity. 63:1-63:6 - Scott Roberts, Dale Patterson:
Virtual weather systems: measuring impact within videogame environments. 64:1-64:7 - Siew Mai Bong, Shaun Bangay:
Use of a biologically adapted reaction-diffusion model to generate hair properties for synthetic creatures. 65:1-65:10 - Morteza Behrooz, Arnav Jhala:
Modeling social interestingness in conversational stories. 66:1-66:6 - Harley Ogier, Jim Buchan:
Exploring the feasibility of diegetic in-game store user interfaces. 67:1-67:10 - Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
A trust model based energy detection for cognitive radio networks. 68:1-68:8 - Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
Framework for SCADA cyber-attack dataset creation. 69:1-69:10 - Sriram Raghavan, Udaya Parampalli, S. V. Raghavan:
Re-engineering simultaneous internet sessions process-separated browsers. 70:1-70:10 - Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo:
An efficient and provably secure RFID grouping proof protocol. 71:1-71:7 - Youyang Qu, Jiyang Xu, Shui Yu:
Privacy preserving in big data sets through multiple shuffle. 72:1-72:8 - Xiaotong Wu, Wan-Chun Dou, Qiang Ni:
Game theory based privacy preserving analysis in correlated data publication. 73:1-73:10 - Jiaping Lin, Xingwen Zhao, Hui Li:
Target: category-based android malware detection revisited. 74:1-74:9 - Toby J. Richer:
Entropy-based detection of botnet command and control. 75:1-75:4 - Longxia Huang, Gongxuan Zhang, Anmin Fu:
Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group. 76:1-76:6 - Klaus-Dieter Schewe, Flavio Ferrarotti, Loredana Tec, Qing Wang, Wenya An:
Evolving concurrent systems: behavioural theory and logic. 77:1-77:10 - Sara Khalifa:
Energy-efficient human activity recognition for self-powered wearable devices. 78:1-78:2
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.