25. ACSC 2002:
Melbourne,
Victoria,
Australia
Michael J. Oudshoorn (Ed.):
Computer Science 2002, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Monash University, Melbourne, Victoria, January/February 2002.
CRPIT 4 Australian Computer Society 2002, ISBN 0-909-92582-8 @proceedings{DBLP:conf/acsc/2002,
editor = {Michael J. Oudshoorn},
title = {Computer Science 2002, Twenty-Fifth Australasian Computer Science
Conference (ACSC2002), Monash University, Melbourne, Victoria,
January/February 2002},
booktitle = {ACSC},
publisher = {Australian Computer Society},
series = {CRPIT},
volume = {4},
year = {2002},
isbn = {0-909-92582-8},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Robert Biddle, James Noble, Ewan D. Tempero:
Essential Use Cases and Responsibility in Object-Oriented Development.
7-16
- C. Cerecke:
Repairing Syntax Errors in LR-based Parsers.
17-22
- Bill Clarke, Adam Czezowski, Peter E. Strazdins:
Implemention Aspects of a SPARC V9 Complete Machine Simulator.
23-32
- Robert Colvin, Ian J. Hayes, David Hemer, Paul A. Strooper:
Translating Refined Logic Programs to Mercury.
33-40
- A. Cramp, Michael J. Oudshoorn:
Employing Hierarchical Federation Communities in the Virtual Ship Architecture.
41-49
- B. Croft:
The Future of Web Search.
- Mark Evered:
Bracket Capabilities for Distributed Systems Security.
51-58
- Raphael A. Finkel, Arkady B. Zaslavsky, Krisztián Monostori, Heinz W. Schmidt:
Signature Extraction for Overlap Detection in Documents.
59-64
- Mohammad M. Fuad, Michael J. Oudshoorn:
AdJava - Automatic Distribution of Java Applications.
65-75
- S. E. George:
Learning and the Reflective Journal in Computer Science.
77-86
- Steffen Heinz, Justin Zobel:
Performance of Data Structures for Small Sets of Strings.
87-94
- David Hemer, Peter A. Lindsay:
Supporting Component-Based Reuse in CARE.
95-104
- Philip Hingston:
Using Finite State Automata for Sequence Mining.
105-110
- Philip Hingston, R. Lyndon While:
A Dynamic Communication Algorithm for Digital Halftoning.
111-118
- R. Hutchens, S. Singh:
Bandwidth Reservation Strategies for Mobility Support of Wireless Connections with QoS Guarantees.
119-128
- R. Yugo Kartono Isal, Alistair Moffat, A. C. H. Ngai:
Enhanced Word-Based Block-Sorting Text Compression.
129-137
- J. Y. Lee, John J. Zic:
On Modelling Real-Time Mobile Processes.
139-147
- Trent W. Lewis, David M. W. Powers:
Audio-Visual Speech Recognition Using Red Exclusion and Neural Networks.
149-156
- Krisztián Monostori, Arkady B. Zaslavsky, Heinz W. Schmidt:
Suffix Vector: Space- and Time-Efficient Alternative to Suffix Trees.
157-165
- John Morris, Chiou Peng Lam, Gareth Lee, Kris Parker, Gary A. Bundell:
Determining Component Reliability Using a Testing Index.
167-176
- Jasvir Nagra, Clark D. Thomborson, Christian S. Collberg:
A Functional Taxonomy for Software Watermarking.
177-186
- James Noble, Robert Biddle, Ewan D. Tempero:
Metaphor and Metonymy in Object-Oriented Design Patterns.
187-195
- Iyad Rahwan, Ryszard Kowalczyk, H. H. Pham:
Intelligent Agents for Automated One-to-Many e-Commerce Negotiation.
197-203
- Omer F. Rana, Michael Winikoff, Lin Padgham, James Harland:
Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids.
205-214
- Nick Randolph, John Morris, Gareth Lee:
A Generalised Spreadsheet Verification Methodology.
215-222
- John F. Roddick, A. L. Nieuwenhuis:
Application Rates to Undergraduate Programs in Information Technology in Australian Universities.
223-231
- D. Shin, K. Koh:
Optimizing Web Content Delivery Using Web Server Accelerator.
233-239
- Andrew Skabar, Ian Cloete:
Neural Networks and Financial Trading and the Efficient Markets Hypothesis.
241-249
- G. Smith:
Specifying Mode Requirements of Embedded Systems.
251-257
- John Thangarajah, Lin Padgham, James Harland:
Representation and Reasoning for Goals in BDI Agents.
259-265
- Andrew Turpin, William F. Smyth:
An Approach to Phrase Selection for Offline Data Compression.
267-273
- Alexandra L. Uitdenbogerd, Justin Zobel:
Music Ranking Techniques Evaluated.
275-283
- Hua Wang, Jinli Cao, Yanchuan Zhang:
Ticket-Based Service Access Scheme for Mobile Users.
285-292
- L. While, G. Mildenhall:
An Implementation of Parallel Pattern-Matching via Concurrent Haskell.
293-303
- K. Winter:
Model Checking Railway Interlocking Systems.
303-310
- R. J. Witt, S. P. Tyerman:
Reducing Cognitive Overhead on the World Wide Web.
311-320
- Jehak Woo, Jongwook Woo, Isabelle Attali, Denis Caromel, Jean-Luc Gaudiot, Andrew L. Wendelborn:
Alias Analysis for Exceptions in Java.
321-329
- Lei Zheng, Peter J. Stuckey:
Improving SAT Using 2SAT.
331-340
Copyright © Mon Mar 15 03:06:30 2010
by Michael Ley (ley@uni-trier.de)