


default search action
37th ACSC 2014: Auckland, New Zealand
- Bruce Thomas, Dave Parry:

Thirty-Seventh Australasian Computer Science Conference, ACSC 2014, Auckland, New Zealand, January 2014. CRPIT 147, Australian Computer Society 2014, ISBN 978-1-921770-30-2 - Stephan Müller, Lars Butzmann, Stefan Klauck, Hasso Plattner:

An Adaptive Aggregate Maintenance Approach for Mixed Workloads in Columnar In-Memory Databases. 3-12 - Tong-Wook Shinn, Tadao Takaoka:

Combining the Shortest Paths and the Bottleneck Paths Problems. 13-18 - C. L. Lim, Alistair Moffat, Anthony Ian Wirth:

Lazy and Eager Approaches for the Set Cover Problem. 19-27 - Roman Klapaukh, David J. Pearce, Stuart Marshall:

Towards a Vertex and Edge Label Aware Force Directed Layout Algorithm. 29-37 - Johannes Wust, C. Meyer, Hasso Plattner:

DAC: Database Application Context Analysis applied to Enterprise Applications. 39-48 - David Friggens, Lindsay Groves:

Shape Predicates Allow Unbounded Verification of Linearizability Using Canonical Abstraction. 49-56 - Michael Rinck, Annika Hinze, David Bainbridge:

Document DNA: Content Centric Provenance Data Tracking in Documents. 57-66 - Doug Hunt, Dave Parry, Stefan Schliebs:

Exploring the applicability of Reservoir methods for Classifying Punctual Sports Activities Using On-body Sensors. 67-73 - S. Tucker, Peter Darcy, Bela Stantic:

A Comparative Study of RFID Technology Measuring Efficiency and Acceptance when Capturing Attendance. 75-79 - Sushanta Karmakar, Subhrendu Chattopadhyay:

A Trigger Counting Mechanism for Ring Topology. 81-87 - Mohamed Anis Zemni, Amel Mammar, Nejib Ben Hadj-Alouane:

Formal Approach for Generating Privacy Preserving User Requirements-Based Business Process Fragments. 89-98 - Hoang Minh Nguyen, Burkhard C. Wünsche, Patrice Delmas, Christof Lutteroth:

Poisson Blended Exemplar-based Texture Completion. 99-104 - X. Chen, A. Y. Wang, Ewan D. Tempero:

A Replication and Reproduction of Code Clone Detection Studies. 105-114 - H. Margono, X. Yi, G. Raikundalia:

Mining Indonesian Cyber Bullying Patterns in Social Networks. 115-124 - Nicholas Vanderschantz, Annika Hinze, Sally Jo Cunningham:

Current Educational Technology Use for Digital Information Acquisition by Young New Zealand Children. 125-134 - O. Mayan, Judithe Sheard, Angela Carbone:

Understanding Saudi Arabian students' engagement in E-learning 2.0 in Australian Higher Education. 135-143

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














