26. ACSC 2003: Adelaide, South Australia
Michael J. Oudshoorn (Ed.): Computer Science 2003, Twenty-Sixth Australasian Computer Science Conference (ACSC2003), Adelaide, South Australia, February 2003. Australian Computer Society 2003 CRPIT 16 ISBN 0-909-92594-1
Lloyd Allison: Types and Classes of Machine Learning and Data Mining. 207-215
Anna Buttfield: A New Approach to Rapid Image Morphing for Lip Motion Synthesis. 79-86
Simon Carter, Malcolm Graham, Paul A. Strooper, Zhiguo Yuan: Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models. 29-34
Pauline Lienhua Chou, Xiuzhen Zhang: Efficiently Computing the Top N Averages in Iceberg Cubes. 101-109
Paul D. Coddington, Lici Lu, Darren Webb, Andrew L. Wendelborn: Extensible Job Managers for Grid Computing. 151-159
Robert Dale, Sabine Geldof, Jean-Philippe Prost: Using Natural Language Generation for Navigational Assistance. 35-44
Julian R. Dermoudy: A Novel Approach to Parenting in Functional Program Evaluation. 217-226
Adam Dunn: Environment-Independent Performance Analyses of Cryptographic Algorithms. 265-274
Darren Freeman, Greg Knowles: Hardware Acceleration of JPEG2000 Image Compression for Low-Power Embedded Applications. 325-331
René Hexel: FITS - A Fault Injection Architecture for Time-Triggered Systems. 333-338
Xiaodi Huang, Wei Lai: Force-Transfer: A New Approach to Removing Overlapping Nodes in Graph Layout. 349-358
Yan Jin, Robert Esser, Charles Lakos: Lightweight Consistency Analysis of Dataflow Process Networks. 291-300
Rilla Khaled, James Noble, Robert Biddle: InspectJ: Program Monitoring for Visualisation Using AspectJ. 359-368
Christopher Leckie, Kotagiri Ramamohanarao: Policies for Sharing Distributed Probabilistic Beliefs. 285-290
Michael J. Mayo: Symbol Grounding and its Implications for Artificial Intelligence. 55-60
Lee Naish: Approximating the Success Set of Logic Programs Using Constrained Regular Types. 61-67
Stuart Norcross, Ronald Morrison, David S. Munro, Henry Detmold: Implementing a Family of Distributed Garbage Collectors. 161-170

John F. Roddick, Kathleen Hornsby, Denise de Vries: A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values. 111-118


Trevor C. Tao, David J. Crisp: A Useful Bound for Region Merging Algorithms in a Bayesian Model. 95-100
Udaya Kiran Tupakula, Vijay Varadharajan: A Practical Method to Counteract Denial of Service Attacks. 275-284
Francis Vaughan, Duncan A. Grove, Paul D. Coddington: Communication Performance Issues for Two Cluster Computers. 171-180
Bill B. Wang, Robert I. McKay, Hussein A. Abbass, Michael Barlow: A Comparative Study for Domain Ontology Guided Feature Extraction. 69-78
Hua Wang, Jinli Cao, Yanchun Zhang: A Flexible Payment Scheme and its Permission-Role Assignment. 189-198
Kirsten Winter, Neil J. Robinson: Modelling Large Railway Interlockings and Model Checking Small Ones. 309-316
Liyin Xue, Mehmet A. Orgun, Kang Zhang: A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors. 19-28
Ying Zhao, Wanlei Zhou, Elicia Lanham, Shui Yu, Mingjun Lan: Self-Adaptive Clock Synchronization Based on Clock Precision Difference. 181-187



