default search action
27th ACSC 2004: Dunedin, New Zealand
- Vladimir Estivill-Castro:
Computer Science 2004, Twenty-Seveth Australasian Computer Science Conference (ACSC2004), Dunedin, New Zealand, January 2004. CRPIT 26, Australian Computer Society 2004, ISBN 1-920682-05-8 - James D. Allert:
The Effectiveness of Innovative Approaches to CS1: Comparing Opinion to Outcome. 151-157 - Justin Ammerlaan, David Wright:
Adaptive Cooperative Fuzzy Logic Controller. 255-263 - Ricardo A. Baeza-Yates:
Web Mining in Search Engines. 3-4 - Graeme Bell, Michael Weir:
Forward Chaining for Robot and Agent Navigation using Potential Fields. 265-274 - Jonathan Billington, Bing Han:
Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels. 31-39 - William Brodie-Tyrrell, Henry Detmold, Katrina Falkner, David S. Munro:
Garbage Collection for Storage-Oriented Clusters. 99-108 - Michael Ciavarella, Alistair Moffat:
Lossless Image Compression Using Pixel Reordering. 125-132 - David J. A. Cooper, Benjamin Khoo, Brian R. von Konsky, Mike Robey:
Java Implementation Verification Using Reverse Engineering. 203-211 - Anthony H. Dekker, Bernard D. Colbert:
Network Robustness and Graph Topology. 359-368 - Michael Ditze, Peter Altenbernd, Chris Loeser:
Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices. 133-142 - Hossam A. ElGindy, George Ferizis:
On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm. 109-115 - Stephan Flake:
Towards the Completion of the Formal Semantics of OCL 2.0. 73-82 - Carsten Friedrich, Falk Schreiber:
Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size. 369-376 - Peter Fule, John F. Roddick:
Detecting Privacy and Ethical Sensitivity in Data Mining Results. 159-166 - Steven Garcia, Hugh E. Williams, Adam Cannane:
Access-Ordered Indexes. 7-14 - Richard A. Hagen, Scott D. Goodwin, Abdul Sattar:
Code Improvements for Model Elimination Based Reasoning Systems. 233-240 - John H. Hine, Paul Dagger:
Securing Distributed Computing Against the Hostile Host. 279-286 - Jan Hoffmann, Uwe Düffert:
Frequency Space Representation of Transitions of Quadruped Robot Gaits. 275-278 - K. Hogg, P. Chilcott, M. Nolan, B. Srinivasan:
An Evaluation of Web Services in the Design of a B2B Application. 331-340 - John W. Holford, William J. Caelli, Anthony W. Rhodes:
Using Self-Defending Objects to Develop Security Aware Applications in Java. 341-349 - Daniel Jang, Peter A. Whigham, Grant Dick:
On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma. 241-247 - S. Jansamak, Athasit Surarerks:
Formalization of UML Statechart Models Using Concurrent Regular Expressions. 83-88 - James Larkin, Phil Stocks:
Self-Replicating Expressions in the Lambda Calculus. 167-173 - Nicholas Lester, Justin Zobel, Hugh E. Williams:
In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems. 15-22 - Trent W. Lewis, David M. W. Powers:
Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition. 305-314 - J. S. Jimmy Li, Sharmil Randhawa:
Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images. 143-149 - Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell:
Visually Sealed and Digitally Signed Documents. 287-294 - Feng Lu, Kris Bubendorfer:
A RMI Protocol for Aglets. 249-253 - Ian D. Mathieson, Sandy Dance, Lin Padgham, Malcolm Gorman:
An Open Meteorological Alerting System: Issues and Solutions. 351-358 - Catherine Menon, Charles Lakos:
Towards a Semantic Basis for Rosetta. 175-184 - Kath Mickan, Ronald Morrison, Graham N. C. Kirby:
Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems. 377-386 - George Mitri, Alexandra L. Uitdenbogerd, Victor Ciesielski:
Automatic Music Classification Problems. 315-322 - Leesa Murray, David A. Carrington, Paul A. Strooper:
An Approach to Specifying Software Frameworks. 185-192 - Phung Hua Nguyen, Jingling Xue:
Strength Reduction for Loop-Invariant Types. 213-222 - James Parnis, Gareth Lee:
Exploiting FPGA Concurrency to Enhance JVM Performance. 223-232 - Asad Amir Pirzada, Chris McDonald:
Kerberos Assisted Authentication in Mobile Ad-hoc Networks. 41-46 - Asad Amir Pirzada, Chris McDonald:
Establishing Trust In Pure Ad-hoc Networks. 47-54 - Daniel Powell:
Automatic Derivation of Loop Termination Conditions to Support Verification. 89-97 - Graeme Smith:
A Framework for Modelling and Analysing Mobile Systems. 193-202 - Gao Song:
Reducing Register Pressure Through LAER Algorithm. 55-64 - Wai Wan Tsang, Lucas Chi Kwong Hui, Kam-Pui Chow, C. F. Chong, Sam C. W. Tso:
Tuning the Collision Test for Power. 23-30 - Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao:
Anonymous Access Scheme for Electronic Services. 295-304 - Kylie Williams, Robert Esser:
Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking. 65-71 - Huayang Xie, Peter Andreae, Mengjie Zhang, Paul Warren:
Learning Models for English Speech Recognition. 323-329 - Byung-Hyun Yu, Zhiyi Huang, Stephen Cranefield, Martin K. Purvis:
Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory. 117-123
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.