


default search action
28th ACSC 2005: Newcastle, NSW, Australia
- Vladimir Estivill-Castro:

Computer Science 2005, Twenty-Eighth Australasian Computer Science Conference (ACSC2005), Newcastle, NSW, Australia, January/February 2005. CRPIT 38, Australian Computer Society 2005, ISBN 1-920682-20-1 - Jelita Asian, Hugh E. Williams, Seyed M. M. Tahaghoghi:

Stemming Indonesian. 307-314 - Mihalis Beis, William Duckworth, Michele Zito:

Large k-Separated Matchings of Random Regular Graphs. 175-182 - Regina Berretta, Alexandre Mendes, Pablo Moscato:

Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data. 361-370 - Kris Bubendorfer, John H. Hine:

Auction Based Resource Negotiation in NOMAD. 297-306 - Tri M. Cao, Paul Compton:

A Simulation Framework for Knowledge Acquisition Evaluation. 353-360 - Kelvin Cheng, Masahiro Takatsuka:

Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction. 125-134 - Yang-Wai Chow, Ronald Pose, Matthew Regan:

Large Object Segmentation with Region Priority Rendering. 19-28 - Carl Cook, Neville Churcher:

Modelling and Measuring Collaborative Software Engineering. 267-276 - Dominic Cooney, Marlon Dumas, Paul Roe:

A Programming Language for Web Service Development. 143-150 - Anthony H. Dekker:

Simulating Network Robustness for Critical Infrastructure Networks. 59-68 - Gerry Eisman, Bala Ravikumar:

Approximate Recognition of Non-regular Languages by Finite Automata. 219-228 - Stephen Gilmour, Mark Dras:

A Two-Pronged Attack on the Dragon of Intractability. 183-192 - Erica Glynn, Ian J. Hayes, Anthony MacDonald:

Integration of generic program analysis tools into a software development environment. 249-258 - David Hemer:

A Formal Approach to Component Adaptation and Composition. 259-266 - Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu:

A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments. 39-48 - Xiaodi Huang, Peter Eades, Wei Lai:

A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization. 87-96 - Chris Hunter, Peter J. Robinson, Paul A. Strooper:

Agent-Based Distributed Software Verification. 159-164 - Henning Köhler:

A Contraction Algorithm for finding Minimal Feedback Sets. 165-174 - Kingsly Leung, Christopher Leckie:

Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. 333-342 - Ling Li, Vasily Volkov:

Cloth Animation with Adaptively Refined Meshes. 107-114 - Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon:

A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively. 29-38 - Chuchang Liu, Patrick McLean, Maris A. Ozols:

Combining Logics for Modelling Security Policies. 323-332 - Martin H. Luerssen:

Graph Grammar Encoding and Evolution of Automata Networks. 229-238 - Stanislaw P. Maj, G. Kohli, T. Fetherston:

A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies. 135-142 - Kim Marriott, Peter Moulder, Lucas R. Hope, Charles Twardy:

Layout of Bayesian Networks. 97-106 - Damien McAullay, Graham J. Williams, Jie Chen, Huidong Jin:

A Delivery Framework for Health Data Mining and Analytics. 381-390 - Pablo Moscato, Luke Mathieson, Alexandre Mendes, Regina Berretta:

The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction. 371-380 - Gregory Neverov, Paul Roe:

Towards a Fully-reflective Meta-programming Language. 151-158 - Phung Hua Nguyen, Jingling Xue:

Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading. 9-18 - Asad Amir Pirzada, Chris McDonald, Amitava Datta:

Dependable Dynamic Source Routing without a Trusted Third Party. 79-86 - Caspar Ryan, Atish Gonsalves:

The Effect of Context and Application Type on Mobile Usability: An Empirical Study. 115-124 - Abdelsalam Shanneb, John Potter:

Flexible Exclusion Control for Composite Objects. 277-286 - Seyed M. M. Tahaghoghi, Hugh E. Williams, James A. Thom, Timo Volkmer:

Video Cut Detection using Frame Windows. 193-200 - Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham:

A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights. 209-218 - Jeffrey D. Ullman:

Gradiance On-Line Accelerated Learning. 3-6 - Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla:

A High Performance Kernel-Less Operating System Architecture. 287-296 - Hua Wang

, Lili Sun, Yanchun Zhang, Jinli Cao:
Authorization Algorithms for the Mobility of User-Role Relationship. 69-78 - Huaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian He, Qiang Wu:

Fractal Image Compression on a Pseudo Spiral Architecture. 201-208 - Lyndon While, Tony Field:

Optimising Parallel Pattern-matching by Source-level Program Transformation. 239-248 - Ryan Wishart, Ricky Robinson, Jadwiga Indulska:

SuperstringRep: Reputation-enhanced Service Discovery. 49-58 - Yingxin Wu, Masahiro Takatsuka:

The Geodesic Self-Organizing Map and Its Error Analysis. 343-352 - Dongqiang Yang, David M. W. Powers:

Measuring Semantic Similarity in the Taxonomy of WordNet. 315-322

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














