default search action
29th ACSC 2006: Hobart, Tasmania, Australia
- Vladimir Estivill-Castro, Gillian Dobbie:
Computer Science 2006, Twenty-Nineth Australasian Computer Science Conference (ACSC2006), Hobart, Tasmania, Australia, January 16-19 2006. CRPIT 48, Australian Computer Society 2006, ISBN 1-920682-30-9 - Chris R. Johnson, David M. Weinstein:
Biomedical computing and visualization. 3-10 - Greg Reeve, Steve Reeves:
Logic and refinement for charts. 13-23 - Min-Sheng Hsieh, Ewan D. Tempero:
Supporting software reuse by the individual programmer. 25-33 - Hayden Melton, Ewan D. Tempero:
Identifying refactoring opportunities by identifying dependency cycles. 35-41 - R. Ian Faulconbridge, Mark R. Pickering, Michael J. Ryan:
Unsupervised band removal leading to improved classification accuracy of hyperspectral images. 43-48 - Eric H. C. Choi:
On compensating the Mel-frequency cepstral coefficients for noisy speech recognition. 49-54 - Sergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy:
Segregated failures model for availability evaluation of fault-tolerant systems. 55-61 - Suan Khai Chong, Graham Farr, Laura Frost, Simon Hawley:
On pedagogically sound examples in public-key cryptography. 63-68 - Chuchang Liu, Mehmet A. Orgun:
Towards security labelling. 69-76 - Ken Tokoro, Kazuaki Yamaguchi, Sumio Masuda:
Improvements of TLAESA nearest neighbour search algorithm and extension to approximation search. 77-83 - Audun Jøsang, Ross Hayward, Simon Pope:
Trust network analysis with subjective logic. 85-94 - Bahadorreza Ofoghi, John Yearwood, Ranadhir Ghosh:
A semantic approach to boost passage retrieval effectiveness for question answering. 95-101 - Lloyd Allison:
A programming paradigm for machine learning, with a case study of Bayesian networks. 103-111 - Zheng Zheng, Guangquan Zhang, Qing He, Jie Lu, Zhongzhi Shi:
Rule sets based bilevel decision model. 113-120 - Aniruddha Dasgupta, Aditya K. Ghose:
CASO: a framework for dealing with objectives in a constraint-based extension to AgentSpeak(L). 121-126 - S. Cikara, Stanislaw P. Maj, David T. Shaw:
Modelling layer 2 and layer 3 device bandwidths using B-node theory. 127-136 - Cruz Izu:
Throughput fairness in k-ary n-cube networks. 137-145 - Feng Lu, Kris Bubendorfer:
A JMX toolkit for merging network management systems. 147-156 - Hans-Jörg Schulz, Thomas Nocke, Heidrun Schumann:
A framework for visual data mining of structures. 157-166 - Alex Penev, Raymond K. Wong:
Shallow NLP techniques for internet search. 167-176 - Annika Hinze, Yann Michel, Torsten Schlieder:
Approximative filtering of XML documents in a publish/subscribe system. 177-185 - Anirban Majumdar, Clark D. Thomborson:
Manufacturing opaque predicates in distributed systems for code obfuscation. 187-196 - Sven Bittner, Annika Hinze:
Pruning subscriptions in distributed publish/subscribe systems. 197-206 - Annika Hinze, George Buchanan:
The challenge of creating cooperating mobile services: experiences and lessons learned. 207-215 - Yang-Wai Chow, Ronald Pose, Matthew Regan, James G. Phillips:
Human visual perception of region warping distortions. 217-226 - Scott Vallance, Paul R. Calder:
Rendering multi-perspective images with trilinear projection. 227-235 - Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham:
Extensible detection and indexing of highlight events in broadcasted sports video. 237-246 - Timothy J. Everts, Sung Sik Park, Byeong Ho Kang:
Using formal concept analysis with an incremental knowledge acquisition system for web document management. 247-256 - Annika Hinze, Petra Malik, Robi Malik:
Interaction design for a mobile context-aware system using discrete event modelling. 257-266 - Carl Cook, Neville Churcher:
Constructing real-time collaborative software engineering tools using CAISE, an architecture for supporting tool development. 267-276 - Christian Arwin, Seyed M. M. Tahaghoghi:
Plagiarism detection across programming languages. 277-286 - Freeman Yufei Huang, C. Barry Jay, David B. Skillicorn:
Programming with heterogeneous structures: manipulating XML data using bondi. 287-295 - Clara Murdaca, C. Barry Jay:
A relational account of objects. 297-302 - Colin J. Fidge, Tim McComb:
Tracing secure information flow through mode changes. 303-310 - Amit Vasudevan, Ramesh Yerraballi:
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation. 311-320 - Hua Wang, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson:
A framework for role-based group deligation in distributed environments. 321-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.