James M. Hogan, Paul Montague, Martin K. Purvis, Chris Steketee (Eds.):
ACSW Frontiers 2004, 2004 ACSW Workshops - the Australasian Information Security Workshop (AISW2004), the Australasian Workshop on Data Mining and Web Intelligence (DMWI2004), and the Australasian Workshop on Software Internationalisation (AWSI2004) . Dunedin, New Zealand, January 2004.
CRPIT 32 Australian Computer Society 2004, ISBN 1-920682-14-7
Second Australasian Information Security Workshop
- Daniel Bradley, Audun Jøsang:
Mesmerize - an open framework for enterprise security management.
37-42
- Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald:
Defining Security Services for Electronic Tendering.
43-52
- Mark Evered, Serge Bögeholz:
A Case Study in Access Control Requirements for a Health Information System.
53-61
- Audun Jøsang, Daniel Bradley, Svein J. Knapskog:
Belief-Based Risk Analysis.
63-68
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Secure Key Issuing in ID-based Cryptography.
69-74
- Akito Monden, Antoine Monsifrot, Clark D. Thomborson:
A Framework for Obfuscated Interpretation.
7-16
- John Page, Arkady B. Zaslavsky, Maria Indrawan:
A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios.
17-25
- Gerald Quirchmayr:
Survivability and Business Continuity Management.
3-6
- Hung-Min Sun, Bin-Tsan Hsieh:
On the Security of Some Proxy Blind Signature Schemes.
75-78
- Clark D. Thomborson, Jasvir Nagra, Ram Somaraju, Charles He:
Tamper-proo ng Software Watermarks.
27-36
Australasian Workshop on Data Mining and Web Intelligence
- Ahsan Abdullah, Stephen Brobst, Ijaz Pervaiz:
Learning Dynamics of Pesticide Abuse through Data Mining.
151-156
- Adam Blazejewski, Richard Coggins:
Application of self-organizing maps to clustering of high-frequency Financial data.
85-90
- Bostjan Brumen, Izidor Golob, Hannu Jaakkola, Tatjana Welzer, Ivan Rozman:
Early Assessment of Classification Performance.
91-96
- Jisong Chen, Rowena Chau, Chung-Hsing Yeh:
Discovering Parallel Text from the World Wide Web.
157-161
- Da Deng, Jianhua Zhang, Martin K. Purvis:
Visualisation and Comparison of Image Collections based on Self-organised Maps.
97-102
- Peter Fule, John F. Roddick:
Experiences in Building a Tool for Navigating Association Rule Result Sets.
103-108
- Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady B. Zaslavsky:
Cost-Efficient Mining Techniques for Data Streams.
109-114
- Zahidul Islam, Ljiljana Brankovic:
A Framework for Privacy Preserving Classification in Data Mining.
163-168
- Eamonn J. Keogh, Jessica Lin, Stefano Lonardi, Bill Yuan-chi Chiu:
We Have Seen the Future, and It Is Symbolic.
83
- Masahiro Motoyoshi, Takao Miura, Isamu Shioya:
Clustering Stream Data by Regression Analysis.
115-120
- David Parry:
A fuzzy ontology for medical document retrieval.
121-126
- Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin K. Fleurke:
Monitoring and controlling of a multi - agent based workflow system.
127-132
- William D. Smart, Mengjie Zhang:
Applying Online Gradient Descent Search to Genetic Programming for Object Recognition.
133-138
- Jacky W. W. Wan, Gillian Dobbie:
Mining Association Rules from XML Data using XQuery.
169-174
- Brendon J. Woodford, Da Deng, George L. Benwell:
A wavelet-based neuro-fuzzy system for data mining small image sets.
139-143
- Huayang Xie, Peter Andreae, Mengjie Zhang, Paul Warren:
Detecting Stress in Spoken English using Decision Trees and Support Vector Machines.
145-150
- Qingqing Zhou, Martin K. Purvis:
A Market-based Rule Learning System.
175-180
Australasian Workshop on Software Internationalisation
Copyright © Mon Mar 15 03:06:35 2010
by Michael Ley (ley@uni-trier.de)