default search action
28th ACSC 2005: Newcastle, NSW, Australia
- Vladimir Estivill-Castro:
Computer Science 2005, Twenty-Eighth Australasian Computer Science Conference (ACSC2005), Newcastle, NSW, Australia, January/February 2005. CRPIT 38, Australian Computer Society 2005, ISBN 1-920682-20-1 - Jelita Asian, Hugh E. Williams, Seyed M. M. Tahaghoghi:
Stemming Indonesian. 307-314 - Mihalis Beis, William Duckworth, Michele Zito:
Large k-Separated Matchings of Random Regular Graphs. 175-182 - Regina Berretta, Alexandre Mendes, Pablo Moscato:
Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data. 361-370 - Kris Bubendorfer, John H. Hine:
Auction Based Resource Negotiation in NOMAD. 297-306 - Tri M. Cao, Paul Compton:
A Simulation Framework for Knowledge Acquisition Evaluation. 353-360 - Kelvin Cheng, Masahiro Takatsuka:
Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction. 125-134 - Yang-Wai Chow, Ronald Pose, Matthew Regan:
Large Object Segmentation with Region Priority Rendering. 19-28 - Carl Cook, Neville Churcher:
Modelling and Measuring Collaborative Software Engineering. 267-276 - Dominic Cooney, Marlon Dumas, Paul Roe:
A Programming Language for Web Service Development. 143-150 - Anthony H. Dekker:
Simulating Network Robustness for Critical Infrastructure Networks. 59-68 - Gerry Eisman, Bala Ravikumar:
Approximate Recognition of Non-regular Languages by Finite Automata. 219-228 - Stephen Gilmour, Mark Dras:
A Two-Pronged Attack on the Dragon of Intractability. 183-192 - Erica Glynn, Ian J. Hayes, Anthony MacDonald:
Integration of generic program analysis tools into a software development environment. 249-258 - David Hemer:
A Formal Approach to Component Adaptation and Composition. 259-266 - Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu:
A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments. 39-48 - Xiaodi Huang, Peter Eades, Wei Lai:
A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization. 87-96 - Chris Hunter, Peter J. Robinson, Paul A. Strooper:
Agent-Based Distributed Software Verification. 159-164 - Henning Köhler:
A Contraction Algorithm for finding Minimal Feedback Sets. 165-174 - Kingsly Leung, Christopher Leckie:
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. 333-342 - Ling Li, Vasily Volkov:
Cloth Animation with Adaptively Refined Meshes. 107-114 - Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon:
A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively. 29-38 - Chuchang Liu, Patrick McLean, Maris A. Ozols:
Combining Logics for Modelling Security Policies. 323-332 - Martin H. Luerssen:
Graph Grammar Encoding and Evolution of Automata Networks. 229-238 - Stanislaw P. Maj, G. Kohli, T. Fetherston:
A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies. 135-142 - Kim Marriott, Peter Moulder, Lucas R. Hope, Charles Twardy:
Layout of Bayesian Networks. 97-106 - Damien McAullay, Graham J. Williams, Jie Chen, Huidong Jin:
A Delivery Framework for Health Data Mining and Analytics. 381-390 - Pablo Moscato, Luke Mathieson, Alexandre Mendes, Regina Berretta:
The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction. 371-380 - Gregory Neverov, Paul Roe:
Towards a Fully-reflective Meta-programming Language. 151-158 - Phung Hua Nguyen, Jingling Xue:
Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading. 9-18 - Asad Amir Pirzada, Chris McDonald, Amitava Datta:
Dependable Dynamic Source Routing without a Trusted Third Party. 79-86 - Caspar Ryan, Atish Gonsalves:
The Effect of Context and Application Type on Mobile Usability: An Empirical Study. 115-124 - Abdelsalam Shanneb, John Potter:
Flexible Exclusion Control for Composite Objects. 277-286 - Seyed M. M. Tahaghoghi, Hugh E. Williams, James A. Thom, Timo Volkmer:
Video Cut Detection using Frame Windows. 193-200 - Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham:
A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights. 209-218 - Jeffrey D. Ullman:
Gradiance On-Line Accelerated Learning. 3-6 - Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla:
A High Performance Kernel-Less Operating System Architecture. 287-296 - Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao:
Authorization Algorithms for the Mobility of User-Role Relationship. 69-78 - Huaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian He, Qiang Wu:
Fractal Image Compression on a Pseudo Spiral Architecture. 201-208 - Lyndon While, Tony Field:
Optimising Parallel Pattern-matching by Source-level Program Transformation. 239-248 - Ryan Wishart, Ricky Robinson, Jadwiga Indulska:
SuperstringRep: Reputation-enhanced Service Discovery. 49-58 - Yingxin Wu, Masahiro Takatsuka:
The Geodesic Self-Organizing Map and Its Error Analysis. 343-352 - Dongqiang Yang, David M. W. Powers:
Measuring Semantic Similarity in the Taxonomy of WordNet. 315-322
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.