25. ACSC 2002: Melbourne, Victoria, Australia
Michael J. Oudshoorn (Ed.): Computer Science 2002, Twenty-Fifth Australasian Computer Science Conference (ACSC2002), Monash University, Melbourne, Victoria, January/February 2002. Australian Computer Society 2002 CRPIT 4 ISBN 0-909-92582-8
Robert Biddle, James Noble, Ewan D. Tempero: Essential Use Cases and Responsibility in Object-Oriented Development. 7-16
C. Cerecke: Repairing Syntax Errors in LR-based Parsers. 17-22
Bill Clarke, Adam Czezowski, Peter E. Strazdins: Implemention Aspects of a SPARC V9 Complete Machine Simulator. 23-32
Robert Colvin, Ian J. Hayes, David Hemer, Paul A. Strooper: Translating Refined Logic Programs to Mercury. 33-40
A. Cramp, Michael J. Oudshoorn: Employing Hierarchical Federation Communities in the Virtual Ship Architecture. 41-49
B. Croft: The Future of Web Search.
Mark Evered: Bracket Capabilities for Distributed Systems Security. 51-58
Raphael A. Finkel, Arkady B. Zaslavsky, Krisztián Monostori, Heinz W. Schmidt: Signature Extraction for Overlap Detection in Documents. 59-64
S. E. George: Learning and the Reflective Journal in Computer Science. 77-86

Philip Hingston: Using Finite State Automata for Sequence Mining. 105-110
R. Hutchens, S. Singh: Bandwidth Reservation Strategies for Mobility Support of Wireless Connections with QoS Guarantees. 119-128
R. Yugo Kartono Isal, Alistair Moffat, A. C. H. Ngai: Enhanced Word-Based Block-Sorting Text Compression. 129-137
Trent W. Lewis, David M. W. Powers: Audio-Visual Speech Recognition Using Red Exclusion and Neural Networks. 149-156
Krisztián Monostori, Arkady B. Zaslavsky, Heinz W. Schmidt: Suffix Vector: Space- and Time-Efficient Alternative to Suffix Trees. 157-165
John Morris, Chiou Peng Lam, Gareth Lee, Kris Parker, Gary A. Bundell: Determining Component Reliability Using a Testing Index. 167-176
Jasvir Nagra, Clark D. Thomborson, Christian S. Collberg: A Functional Taxonomy for Software Watermarking. 177-186
James Noble, Robert Biddle, Ewan D. Tempero: Metaphor and Metonymy in Object-Oriented Design Patterns. 187-195
Iyad Rahwan, Ryszard Kowalczyk, H. H. Pham: Intelligent Agents for Automated One-to-Many e-Commerce Negotiation. 197-203
Omer F. Rana, Michael Winikoff, Lin Padgham, James Harland: Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids. 205-214
John F. Roddick, Adrienne L. Nieuwenhuis: Application Rates to Undergraduate Programs in Information Technology in Australian Universities. 223-231
Andrew Skabar, Ian Cloete: Neural Networks and Financial Trading and the Efficient Markets Hypothesis. 241-249
G. Smith: Specifying Mode Requirements of Embedded Systems. 251-257
John Thangarajah, Lin Padgham, James Harland: Representation and Reasoning for Goals in BDI Agents. 259-265
Andrew Turpin, William F. Smyth: An Approach to Phrase Selection for Offline Data Compression. 267-273

R. Lyndon While, G. Mildenhall: An Implementation of Parallel Pattern-Matching via Concurrent Haskell. 293-303
K. Winter: Model Checking Railway Interlocking Systems. 303-310
Jehak Woo, Jongwook Woo, Isabelle Attali, Denis Caromel, Jean-Luc Gaudiot, Andrew L. Wendelborn: Alias Analysis for Exceptions in Java. 321-329



