26. ACSC 2003:
Adelaide,
South Australia
Michael J. Oudshoorn (Ed.):
Computer Science 2003, Twenty-Sixth Australasian Computer Science Conference (ACSC2003), Adelaide, South Australia, February 2003.
CRPIT 16 Australian Computer Society 2003, ISBN 0-909-92594-1 @proceedings{DBLP:conf/acsc/2003,
editor = {Michael J. Oudshoorn},
title = {Computer Science 2003, Twenty-Sixth Australasian Computer Science
Conference (ACSC2003), Adelaide, South Australia, February 2003},
booktitle = {ACSC},
publisher = {Australian Computer Society},
series = {CRPIT},
volume = {16},
year = {2003},
isbn = {0-909-92594-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Lloyd Allison:
Types and Classes of Machine Learning and Data Mining.
207-215
- Jonathan Billington, Bing Han:
On Defining the Service Provided by TCP.
129-138
- Anna Buttfield:
A New Approach to Rapid Image Morphing for Lip Motion Synthesis.
79-86
- Simon Carter, Malcolm Graham, Paul A. Strooper, Zhiguo Yuan:
Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models.
29-34
- Darin Chan, John F. Roddick:
Context-Sensitive Mobile Database Summarisation.
139-149
- Pauline Lienhua Chou, Xiuzhen Zhang:
Efficiently Computing the Top N Averages in Iceberg Cubes.
101-109
- Voon-Li Chung, Chris McDonald:
Towards Customisable Tuple Field Matching in VLOS.
317-323
- Paul D. Coddington, Lici Lu, Darren Webb, Andrew L. Wendelborn:
Extensible Job Managers for Grid Computing.
151-159
- David J. Crisp, Peter G. Perry, Nicholas J. Redding:
Fast Segmentation of Large Images.
87-93
- Robert Dale, Sabine Geldof, Jean-Philippe Prost:
Using Natural Language Generation for Navigational Assistance.
35-44
- Julian R. Dermoudy:
A Novel Approach to Parenting in Functional Program Evaluation.
217-226
- Hugo A. D. do Nascimento, Peter Eades:
User Hints for Map Labelling.
339-347
- Adam Dunn:
Environment-Independent Performance Analyses of Cryptographic Algorithms.
265-274
- Darren Freeman, Greg Knowles:
Hardware Acceleration of JPEG2000 Image Compression for Low-Power Embedded Applications.
325-331
- Richard A. Hagen, Abdul Sattar:
Improving Search in a Hypothetical Reasoning System.
45-53
- René Hexel:
FITS - A Fault Injection Architecture for Time-Triggered Systems.
333-338
- Timothy C. Hoad, Justin Zobel:
Video Similarity Detection for Digital Rights Management.
237-245
- Xiaodi Huang, Wei Lai:
Force-Transfer: A New Approach to Removing Overlapping Nodes in Graph Layout.
349-358
- Nathan Hurst, Kim Marriott, Peter Moulder:
Cobweb: A Constraint-Based WEB Browser.
247-254
- Yan Jin, Robert Esser, Charles Lakos:
Lightweight Consistency Analysis of Dataflow Process Networks.
291-300
- Rilla Khaled, James Noble, Robert Biddle:
InspectJ: Program Monitoring for Visualisation Using AspectJ.
359-368
- Christopher Leckie, Kotagiri Ramamohanarao:
Policies for Sharing Distributed Probabilistic Beliefs.
285-290
- Michael J. Mayo:
Symbol Grounding and its Implications for Artificial Intelligence.
55-60
- Lee Naish:
Approximating the Success Set of Logic Programs Using Constrained Regular Types.
61-67
- Stuart Norcross, Ronald Morrison, David S. Munro, Henry Detmold:
Implementing a Family of Distributed Garbage Collectors.
161-170
- Tane Pendragon, R. Lyndon While:
Path-Planning by Tessellation of Obstacles.
3-9
- Bernard Pope, Lee Naish:
A Program Transformation for Debugging Haskell 98.
227-236
- John F. Roddick, Kathleen Hornsby, Denise de Vries:
A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values.
111-118
- Kexing Rui, Gregory Butler:
Refactoring Use Case Models: The Metamodel.
301-308
- Vaughan R. Shanks, Hugh E. Williams, Adam Cannane:
Indexing for Fast Categorisation.
119-127
- Ranjan Sinha, Justin Zobel:
Efficient Trie-Based Sorting of Large Sets of Strings.
11-18
- Trevor C. Tao, David J. Crisp:
A Useful Bound for Region Merging Algorithms in a Bayesian Model.
95-100
- Nghi Truong, Peter Bancroft, Paul Roe:
A Web Based Environment for Learning to Program.
255-264
- Udaya Kiran Tupakula, Vijay Varadharajan:
A Practical Method to Counteract Denial of Service Attacks.
275-284
- Francis Vaughan, Duncan A. Grove, Paul D. Coddington:
Communication Performance Issues for Two Cluster Computers.
171-180
- Bill B. Wang, Robert I. McKay, Hussein A. Abbass, Michael Barlow:
A Comparative Study for Domain Ontology Guided Feature Extraction.
69-78
- Hua Wang, Jinli Cao, Yanchun Zhang:
A Flexible Payment Scheme and its Permission-Role Assignment.
189-198
- Kirsten Winter, Neil J. Robinson:
Modelling Large Railway Interlockings and Model Checking Small Ones.
309-316
- Liyin Xue, Mehmet A. Orgun, Kang Zhang:
A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors.
19-28
- Yan Zhang, Anna Liu, Wei Qu:
Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf.
199-206
- Ying Zhao, Wanlei Zhou, Elicia Lanham, Shui Yu, Mingjun Lan:
Self-Adaptive Clock Synchronization Based on Clock Precision Difference.
181-187
Copyright © Mon Mar 15 03:06:30 2010
by Michael Ley (ley@uni-trier.de)