default search action
25th ACSC 2002: Melbourne, Victoria, Australia
- Michael J. Oudshoorn:
Computer Science 2002, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Monash University, Melbourne, Victoria, Australia, January/February 2002. CRPIT 4, Australian Computer Society 2002, ISBN 0-909-92582-8 - Robert Biddle, James Noble, Ewan D. Tempero:
Essential Use Cases and Responsibility in Object-Oriented Development. 7-16 - C. Cerecke:
Repairing Syntax Errors in LR-based Parsers. 17-22 - Bill Clarke, Adam Czezowski, Peter E. Strazdins:
Implemention Aspects of a SPARC V9 Complete Machine Simulator. 23-32 - Robert Colvin, Ian J. Hayes, David Hemer, Paul A. Strooper:
Translating Refined Logic Programs to Mercury. 33-40 - A. Cramp, Michael J. Oudshoorn:
Employing Hierarchical Federation Communities in the Virtual Ship Architecture. 41-49 - B. Croft:
The Future of Web Search. ACSC 2002 - Mark Evered:
Bracket Capabilities for Distributed Systems Security. 51-58 - Raphael A. Finkel, Arkady B. Zaslavsky, Krisztián Monostori, Heinz W. Schmidt:
Signature Extraction for Overlap Detection in Documents. 59-64 - Mohammad M. Fuad, Michael J. Oudshoorn:
AdJava - Automatic Distribution of Java Applications. 65-75 - S. E. George:
Learning and the Reflective Journal in Computer Science. 77-86 - Steffen Heinz, Justin Zobel:
Performance of Data Structures for Small Sets of Strings. 87-94 - David Hemer, Peter A. Lindsay:
Supporting Component-Based Reuse in CARE. 95-104 - Philip Hingston:
Using Finite State Automata for Sequence Mining. 105-110 - Philip Hingston, Ronald Lyndon While:
A Dynamic Communication Algorithm for Digital Halftoning. 111-118 - Ruston Hutchens, Samar Singh:
Bandwidth Reservation Strategies for Mobility Support of Wireless Connections with QoS Guarantees. 119-128 - R. Yugo Kartono Isal, Alistair Moffat, A. C. H. Ngai:
Enhanced Word-Based Block-Sorting Text Compression. 129-137 - J. Y. Lee, John J. Zic:
On Modelling Real-Time Mobile Processes. 139-147 - Trent W. Lewis, David M. W. Powers:
Audio-Visual Speech Recognition Using Red Exclusion and Neural Networks. 149-156 - Krisztián Monostori, Arkady B. Zaslavsky, Heinz W. Schmidt:
Suffix Vector: Space- and Time-Efficient Alternative to Suffix Trees. 157-165 - John Morris, Chiou Peng Lam, Gareth Lee, Kris Parker, Gary A. Bundell:
Determining Component Reliability Using a Testing Index. 167-176 - Jasvir Nagra, Clark D. Thomborson, Christian S. Collberg:
A Functional Taxonomy for Software Watermarking. 177-186 - James Noble, Robert Biddle, Ewan D. Tempero:
Metaphor and Metonymy in Object-Oriented Design Patterns. 187-195 - Iyad Rahwan, Ryszard Kowalczyk, H. H. Pham:
Intelligent Agents for Automated One-to-Many e-Commerce Negotiation. 197-203 - Omer F. Rana, Michael Winikoff, Lin Padgham, James Harland:
Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids. 205-214 - Nick Randolph, John Morris, Gareth Lee:
A Generalised Spreadsheet Verification Methodology. 215-222 - John F. Roddick, Adrienne L. Nieuwenhuis:
Application Rates to Undergraduate Programs in Information Technology in Australian Universities. 223-231 - Dongjun Shin, Kern Koh:
Optimizing Web Content Delivery Using Web Server Accelerator. 233-239 - Andrew Skabar, Ian Cloete:
Neural Networks and Financial Trading and the Efficient Markets Hypothesis. 241-249 - G. Smith:
Specifying Mode Requirements of Embedded Systems. 251-257 - John Thangarajah, Lin Padgham, James Harland:
Representation and Reasoning for Goals in BDI Agents. 259-265 - Andrew Turpin, William F. Smyth:
An Approach to Phrase Selection for Offline Data Compression. 267-273 - Alexandra L. Uitdenbogerd, Justin Zobel:
Music Ranking Techniques Evaluated. 275-283 - Hua Wang, Jinli Cao, Yanchuan Zhang:
Ticket-Based Service Access Scheme for Mobile Users. 285-292 - Lyndon While, G. Mildenhall:
An Implementation of Parallel Pattern-Matching via Concurrent Haskell. 293-303 - Kirsten Winter:
Model Checking Railway Interlocking Systems. 303-310 - R. J. Witt, S. P. Tyerman:
Reducing Cognitive Overhead on the World Wide Web. 311-320 - Jehak Woo, Jongwook Woo, Isabelle Attali, Denis Caromel, Jean-Luc Gaudiot, Andrew L. Wendelborn:
Alias Analysis for Exceptions in Java. 321-329 - Lei Zheng, Peter J. Stuckey:
Improving SAT Using 2SAT. 331-340
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.