28. ACSC 2005: Newcastle, NSW, Australia
Vladimir Estivill-Castro (Ed.): Computer Science 2005, Twenty-Eighth Australasian Computer Science Conference (ACSC2005), Newcastle, NSW, Australia, January/February 2005. Australian Computer Society 2005 CRPIT 38 ISBN 1-920682-20-1
Mihalis Beis, William Duckworth, Michele Zito: Large k-Separated Matchings of Random Regular Graphs. 175-182
Regina Berretta, Alexandre Mendes, Pablo Moscato: Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data. 361-370

Kelvin Cheng, Masahiro Takatsuka: Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction. 125-134
Yang-Wai Chow, Ronald Pose, Matthew Regan: Large Object Segmentation with Region Priority Rendering. 19-28

Anthony H. Dekker: Simulating Network Robustness for Critical Infrastructure Networks. 59-68
Gerry Eisman, Bala Ravikumar: Approximate Recognition of Non-regular Languages by Finite Automata. 219-228
Erica Glynn, Ian J. Hayes, Anthony MacDonald: Integration of generic program analysis tools into a software development environment. 249-258
David Hemer: A Formal Approach to Component Adaptation and Composition. 259-266
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu: A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments. 39-48
Xiaodi Huang, Peter Eades, Wei Lai: A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization. 87-96
Chris Hunter, Peter Robinson, Paul A. Strooper: Agent-Based Distributed Software Verification. 159-164
Henning Köhler: A Contraction Algorithm for finding Minimal Feedback Sets. 165-174
Kingsly Leung, Christopher Leckie: Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. 333-342
Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon: A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively. 29-38
Chuchang Liu, Patrick McLean, Maris A. Ozols: Combining Logics for Modelling Security Policies. 323-332
Martin H. Luerssen: Graph Grammar Encoding and Evolution of Automata Networks. 229-238
Stanislaw P. Maj, G. Kohli, T. Fetherston: A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies. 135-142
Damien McAullay, Graham J. Williams, Jie Chen, Huidong Jin: A Delivery Framework for Health Data Mining and Analytics. 381-390
Pablo Moscato, Luke Mathieson, Alexandre Mendes, Regina Berretta: The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction. 371-380
Phung Hua Nguyen, Jingling Xue: Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading. 9-18
Asad Amir Pirzada, Chris McDonald, Amitava Datta: Dependable Dynamic Source Routing without a Trusted Third Party. 79-86
Caspar Ryan, Atish Gonsalves: The Effect of Context and Application Type on Mobile Usability: An Empirical Study. 115-124
Seyed M. M. Tahaghoghi, Hugh E. Williams, James A. Thom, Timo Volkmer: Video Cut Detection using Frame Windows. 193-200
Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham: A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights. 209-218
Jeffrey D. Ullman: Gradiance On-Line Accelerated Learning. 3-6
Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla: A High Performance Kernel-Less Operating System Architecture. 287-296
Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao: Authorization Algorithms for the Mobility of User-Role Relationship. 69-78
Huaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian He, Qiang Wu: Fractal Image Compression on a Pseudo Spiral Architecture. 201-208
R. Lyndon While, Tony Field: Optimising Parallel Pattern-matching by Source-level Program Transformation. 239-248
Ryan Wishart, Ricky Robinson, Jadwiga Indulska: SuperstringRep: Reputation-enhanced Service Discovery. 49-58
Dongqiang Yang, David M. W. Powers: Measuring Semantic Similarity in the Taxonomy of WordNet. 315-322



