28. ACSC 2005:
Newcastle,
NSW,
Australia
Vladimir Estivill-Castro (Ed.):
Computer Science 2005, Twenty-Eighth Australasian Computer Science Conference (ACSC2005), Newcastle, NSW, Australia, January/February 2005.
CRPIT 38 Australian Computer Society 2005, ISBN 1-920682-20-1
- Jelita Asian, Hugh E. Williams, Seyed M. M. Tahaghoghi:
Stemming Indonesian.
307-314
- Mihalis Beis, William Duckworth, Michele Zito:
Large k-Separated Matchings of Random Regular Graphs.
175-182
- Regina Berretta, Alexandre Mendes, Pablo Moscato:
Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data.
361-370
- Kris Bubendorfer, John H. Hine:
Auction Based Resource Negotiation in NOMAD.
297-306
- Tri M. Cao, Paul Compton:
A Simulation Framework for Knowledge Acquisition Evaluation.
353-360
- Kelvin Cheng, Masahiro Takatsuka:
Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction.
125-134
- Yang-Wai Chow, Ronald Pose, Matthew Regan:
Large Object Segmentation with Region Priority Rendering.
19-28
- Carl Cook, Neville Churcher:
Modelling and Measuring Collaborative Software Engineering.
267-276
- Dominic Cooney, Marlon Dumas, Paul Roe:
A Programming Language for Web Service Development.
143-150
- Anthony H. Dekker:
Simulating Network Robustness for Critical Infrastructure Networks.
59-68
- Gerry Eisman, Bala Ravikumar:
Approximate Recognition of Non-regular Languages by Finite Automata.
219-228
- Stephen Gilmour, Mark Dras:
A Two-Pronged Attack on the Dragon of Intractability.
183-192
- Erica Glynn, Ian J. Hayes, Anthony MacDonald:
Integration of generic program analysis tools into a software development environment.
249-258
- David Hemer:
A Formal Approach to Component Adaptation and Composition.
259-266
- Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu:
A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments.
39-48
- Xiaodi Huang, Peter Eades, Wei Lai:
A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization.
87-96
- Chris Hunter, Peter Robinson, Paul A. Strooper:
Agent-Based Distributed Software Verification.
159-164
- Henning Köhler:
A Contraction Algorithm for finding Minimal Feedback Sets.
165-174
- Kingsly Leung, Christopher Leckie:
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters.
333-342
- Ling Li, Vasily Volkov:
Cloth Animation with Adaptively Refined Meshes.
107-114
- Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon:
A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively.
29-38
- Chuchang Liu, Patrick McLean, Maris A. Ozols:
Combining Logics for Modelling Security Policies.
323-332
- Martin H. Luerssen:
Graph Grammar Encoding and Evolution of Automata Networks.
229-238
- Stanislaw P. Maj, G. Kohli, T. Fetherston:
A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies.
135-142
- Kim Marriott, Peter Moulder, Lucas R. Hope, Charles Twardy:
Layout of Bayesian Networks.
97-106
- Damien McAullay, Graham J. Williams, Jie Chen, Huidong Jin:
A Delivery Framework for Health Data Mining and Analytics.
381-390
- Pablo Moscato, Luke Mathieson, Alexandre Mendes, Regina Berretta:
The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction.
371-380
- Gregory Neverov, Paul Roe:
Towards a Fully-reflective Meta-programming Language.
151-158
- Phung Hua Nguyen, Jingling Xue:
Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading.
9-18
- Asad Amir Pirzada, Chris McDonald, Amitava Datta:
Dependable Dynamic Source Routing without a Trusted Third Party.
79-86
- Caspar Ryan, Atish Gonsalves:
The Effect of Context and Application Type on Mobile Usability: An Empirical Study.
115-124
- Abdelsalam Shanneb, John Potter:
Flexible Exclusion Control for Composite Objects.
277-286
- Seyed M. M. Tahaghoghi, Hugh E. Williams, James A. Thom, Timo Volkmer:
Video Cut Detection using Frame Windows.
193-200
- Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham:
A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights.
209-218
- Jeffrey D. Ullman:
Gradiance On-Line Accelerated Learning.
3-6
- Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla:
A High Performance Kernel-Less Operating System Architecture.
287-296
- Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao:
Authorization Algorithms for the Mobility of User-Role Relationship.
69-78
- Huaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian He, Qiang Wu:
Fractal Image Compression on a Pseudo Spiral Architecture.
201-208
- R. Lyndon While, Tony Field:
Optimising Parallel Pattern-matching by Source-level Program Transformation.
239-248
- Ryan Wishart, Ricky Robinson, Jadwiga Indulska:
SuperstringRep: Reputation-enhanced Service Discovery.
49-58
- Yingxin Wu, Masahiro Takatsuka:
The Geodesic Self-Organizing Map and Its Error Analysis.
343-352
- Dongqiang Yang, David M. W. Powers:
Measuring Semantic Similarity in the Taxonomy of WordNet.
315-322
Copyright © Mon Mar 15 03:06:29 2010
by Michael Ley (ley@uni-trier.de)