30. ACSC 2007:
Ballarat,
Victoria,
Australia
Gillian Dobbie (Ed.):
Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30 - February 2, 2007. Proceedings.
CRPIT 62 Australian Computer Society 2007, ISBN 1-920-68243-0
- Genevieve Bell:
Just Like Magic: Anthropological Musings on the History and Culture of Wireless Technologies.
3
- Kim Marriott, Peter Sbarski:
Compact Layout of Layered Trees.
7-14
- Lin Tian, Tadao Takaoka:
Improved Shortest Path Algorithms For Nearly Acyclic Directed Graphs.
15-24
- Sara Drago, Anton Bogdanovych, Massimo Ancona, Simeon J. Simoff, Carles Sierra:
From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions.
25-33
- Amy Beth Corman, Peter Schachte, Vanessa Teague:
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks.
35-40
- Richard Mason, Wayne Kelly:
Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework.
41-47
- Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska:
Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol.
49-58
- Ying Zhao, Justin Zobel:
Searching With Style: Authorship Attribution in Classic Literature.
59-68
- Sven Hartmann, Sebastian Link:
On Inferences of Full Hierarchical Dependencies.
69-78
- Henning Köhler:
Domination Normal Form - Decomposing Relational Database Schemas.
79-85
- Hayden Melton, Ewan D. Tempero:
Jooj: Real-Time Support For Avoiding Cyclic Dependencies.
87-95
- Nikolas Askitis, Ranjan Sinha:
HAT-Trie: A Cache-Conscious Trie-Based Data Structure For Strings.
97-105
- Yanan Hao, Yanchun Zhang:
Web Services Discovery Based On Schema Matching.
107-113
- Sandy Citro, Jim McGovern, Caspar Ryan:
Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures.
115-124
- Jian Song, Yanchun Zhang:
Architecture of a Web Accelerator For Wireless Networks.
125-129
- Grigori Goldman:
Periodical Payment Model Using Restricted Proxy Certificates.
131-139
- Joel Fenwick, Vladimir Estivill-Castro:
Mutually Visible Agents in a Discrete Environment.
141-150
- Timo Volkmer, James A. Thom, Seyed M. M. Tahaghoghi:
Exploring Human Judgement of Digital Imagery.
151-160
- Nicola Ritter, James R. Cooper:
Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides.
161-169
- Benjamin W. Long, Colin J. Fidge, David A. Carrington:
Cross-Layer Verification of Type Flaw Attacks on Security Protocols.
171-180
- Chuchang Liu, Angela Billard, Maris A. Ozols, Nikifor Jeremic:
Access Control Models and Security Labelling.
181-190
- Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets.
191-200
- Hayden Melton, Ewan D. Tempero:
The CRSS Metric for Package Design Quality.
201-210
- Kelvin Choi, Ewan D. Tempero:
Dynamic Measurement of Polymorphism.
211-220
- Peter E. Strazdins, Bill Clarke, Andrew Over:
Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU.
221-228
Copyright © Mon Mar 15 03:06:29 2010
by Michael Ley (ley@uni-trier.de)