27. ACSC 2004: Dunedin, New Zealand
Vladimir Estivill-Castro (Ed.): Computer Science 2004, Twenty-Seveth Australasian Computer Science Conference (ACSC2004), Dunedin, New Zealand, January 2004. Australian Computer Society 2004 CRPIT 26 ISBN 1-920682-05-8
James D. Allert: The Effectiveness of Innovative Approaches to CS1: Comparing Opinion to Outcome. 151-157
Ricardo A. Baeza-Yates: Web Mining in Search Engines. 3-4
Graeme Bell, Michael Weir: Forward Chaining for Robot and Agent Navigation using Potential Fields. 265-274
Jonathan Billington, Bing Han: Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels. 31-39
William Brodie-Tyrrell, Henry Detmold, Katrina E. Falkner, David S. Munro: Garbage Collection for Storage-Oriented Clusters. 99-108
David J. A. Cooper, Benjamin Khoo, Brian R. von Konsky, Mike Robey: Java Implementation Verification Using Reverse Engineering. 203-211
Michael Ditze, Peter Altenbernd, Chris Loeser: Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices. 133-142
Hossam A. ElGindy, George Ferizis: On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm. 109-115
Stephan Flake: Towards the Completion of the Formal Semantics of OCL 2.0. 73-82
Carsten Friedrich, Falk Schreiber: Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size. 369-376
Peter Fule, John F. Roddick: Detecting Privacy and Ethical Sensitivity in Data Mining Results. 159-166
Richard A. Hagen, Scott D. Goodwin, Abdul Sattar: Code Improvements for Model Elimination Based Reasoning Systems. 233-240
Jan Hoffmann, Uwe Düffert: Frequency Space Representation of Transitions of Quadruped Robot Gaits. 275-278
K. Hogg, P. Chilcott, M. Nolan, B. Srinivasan: An Evaluation of Web Services in the Design of a B2B Application. 331-340
John W. Holford, William J. Caelli, Anthony W. Rhodes: Using Self-Defending Objects to Develop Security Aware Applications in Java. 341-349
Daniel Jang, Peter A. Whigham, Grant Dick: On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma. 241-247
S. Jansamak, A. Surarerks: Formalization of UML Statechart Models Using Concurrent Regular Expressions. 83-88
Nicholas Lester, Justin Zobel, Hugh E. Williams: In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems. 15-22
Trent W. Lewis, David M. W. Powers: Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition. 305-314
J. S. Jimmy Li, Sharmil Randhawa: Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images. 143-149
Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell: Visually Sealed and Digitally Signed Documents. 287-294
Ian D. Mathieson, Sandy Dance, Lin Padgham, Malcolm Gorman: An Open Meteorological Alerting System: Issues and Solutions. 351-358
Kath Mickan, Ronald Morrison, Graham N. C. Kirby: Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems. 377-386
George Mitri, Alexandra L. Uitdenbogerd, Victor Ciesielski: Automatic Music Classification Problems. 315-322
Leesa Murray, David A. Carrington, Paul A. Strooper: An Approach to Specifying Software Frameworks. 185-192

Asad Amir Pirzada, Chris McDonald: Kerberos Assisted Authentication in Mobile Ad-hoc Networks. 41-46
Daniel Powell: Automatic Derivation of Loop Termination Conditions to Support Verification. 89-97
Graeme Smith: A Framework for Modelling and Analysing Mobile Systems. 193-202
Gao Song: Reducing Register Pressure Through LAER Algorithm. 55-64
Wai Wan Tsang, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Sam C. W. Tso: Tuning the Collision Test for Power. 23-30
Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao: Anonymous Access Scheme for Electronic Services. 295-304
Kylie Williams, Robert Esser: Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking. 65-71
Huayang Xie, Peter Andreae, Mengjie Zhang, Paul Warren: Learning Models for English Speech Recognition. 323-329
Byung-Hyun Yu, Zhiyi Huang, Stephen Cranefield, Martin K. Purvis: Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory. 117-123



