27. ACSC 2004:
Dunedin,
New Zealand
Vladimir Estivill-Castro (Ed.):
Computer Science 2004, Twenty-Seveth Australasian Computer Science Conference (ACSC2004), Dunedin, New Zealand, January 2004.
CRPIT 26 Australian Computer Society 2004, ISBN 1-920682-05-8 @proceedings{DBLP:conf/acsc/2004,
editor = {Vladimir Estivill-Castro},
title = {Computer Science 2004, Twenty-Seveth Australasian Computer Science
Conference (ACSC2004), Dunedin, New Zealand, January 2004},
booktitle = {ACSC},
publisher = {Australian Computer Society},
series = {CRPIT},
volume = {26},
year = {2004},
isbn = {1-920682-05-8},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- James D. Allert:
The Effectiveness of Innovative Approaches to CS1: Comparing Opinion to Outcome.
151-157
- Justin Ammerlaan, David Wright:
Adaptive Cooperative Fuzzy Logic Controller.
255-263
- Ricardo A. Baeza-Yates:
Web Mining in Search Engines.
3-4
- Graeme Bell, Michael Weir:
Forward Chaining for Robot and Agent Navigation using Potential Fields.
265-274
- Jonathan Billington, Bing Han:
Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels.
31-39
- William Brodie-Tyrrell, Henry Detmold, Katrina E. Falkner, David S. Munro:
Garbage Collection for Storage-Oriented Clusters.
99-108
- Michael Ciavarella, Alistair Moffat:
Lossless Image Compression Using Pixel Reordering.
125-132
- David J. A. Cooper, Benjamin Khoo, Brian R. von Konsky, Mike Robey:
Java Implementation Verification Using Reverse Engineering.
203-211
- Anthony H. Dekker, Bernard D. Colbert:
Network Robustness and Graph Topology.
359-368
- Michael Ditze, Peter Altenbernd, Chris Loeser:
Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices.
133-142
- Hossam A. ElGindy, George Ferizis:
On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm.
109-115
- Stephan Flake:
Towards the Completion of the Formal Semantics of OCL 2.0.
73-82
- Carsten Friedrich, Falk Schreiber:
Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size.
369-376
- Peter Fule, John F. Roddick:
Detecting Privacy and Ethical Sensitivity in Data Mining Results.
159-166
- Steven Garcia, Hugh E. Williams, Adam Cannane:
Access-Ordered Indexes.
7-14
- Richard A. Hagen, Scott D. Goodwin, Abdul Sattar:
Code Improvements for Model Elimination Based Reasoning Systems.
233-240
- John H. Hine, Paul Dagger:
Securing Distributed Computing Against the Hostile Host.
279-286
- Jan Hoffmann, Uwe Düffert:
Frequency Space Representation of Transitions of Quadruped Robot Gaits.
275-278
- K. Hogg, P. Chilcott, M. Nolan, B. Srinivasan:
An Evaluation of Web Services in the Design of a B2B Application.
331-340
- John W. Holford, William J. Caelli, Anthony W. Rhodes:
Using Self-Defending Objects to Develop Security Aware Applications in Java.
341-349
- Daniel Jang, Peter A. Whigham, Grant Dick:
On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma.
241-247
- S. Jansamak, A. Surarerks:
Formalization of UML Statechart Models Using Concurrent Regular Expressions.
83-88
- James Larkin, Phil Stocks:
Self-Replicating Expressions in the Lambda Calculus.
167-173
- Nicholas Lester, Justin Zobel, Hugh E. Williams:
In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems.
15-22
- Trent W. Lewis, David M. W. Powers:
Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition.
305-314
- J. S. Jimmy Li, Sharmil Randhawa:
Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images.
143-149
- Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell:
Visually Sealed and Digitally Signed Documents.
287-294
- Feng Lu, Kris Bubendorfer:
A RMI Protocol for Aglets.
249-253
- Ian D. Mathieson, Sandy Dance, Lin Padgham, Malcolm Gorman:
An Open Meteorological Alerting System: Issues and Solutions.
351-358
- Catherine Menon, Charles Lakos:
Towards a Semantic Basis for Rosetta.
175-184
- Kath Mickan, Ronald Morrison, Graham N. C. Kirby:
Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems.
377-386
- George Mitri, Alexandra L. Uitdenbogerd, Victor Ciesielski:
Automatic Music Classification Problems.
315-322
- Leesa Murray, David A. Carrington, Paul A. Strooper:
An Approach to Specifying Software Frameworks.
185-192
- Phung Hua Nguyen, Jingling Xue:
Strength Reduction for Loop-Invariant Types.
213-222
- James Parnis, Gareth Lee:
Exploiting FPGA Concurrency to Enhance JVM Performance.
223-232
- Asad Amir Pirzada, Chris McDonald:
Kerberos Assisted Authentication in Mobile Ad-hoc Networks.
41-46
- Asad Amir Pirzada, Chris McDonald:
Establishing Trust In Pure Ad-hoc Networks.
47-54
- Daniel Powell:
Automatic Derivation of Loop Termination Conditions to Support Verification.
89-97
- Graeme Smith:
A Framework for Modelling and Analysing Mobile Systems.
193-202
- Gao Song:
Reducing Register Pressure Through LAER Algorithm.
55-64
- Wai Wan Tsang, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Sam C. W. Tso:
Tuning the Collision Test for Power.
23-30
- Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao:
Anonymous Access Scheme for Electronic Services.
295-304
- Kylie Williams, Robert Esser:
Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking.
65-71
- Huayang Xie, Peter Andreae, Mengjie Zhang, Paul Warren:
Learning Models for English Speech Recognition.
323-329
- Byung-Hyun Yu, Zhiyi Huang, Stephen Cranefield, Martin K. Purvis:
Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory.
117-123
Copyright © Mon Mar 15 03:06:30 2010
by Michael Ley (ley@uni-trier.de)