30. ACSC 2007: Ballarat, Victoria, Australia
Gillian Dobbie (Ed.): Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30 - February 2, 2007. Proceedings. Australian Computer Society 2007 CRPIT 62 ISBN 1-920-68243-0
Genevieve Bell: Just Like Magic: Anthropological Musings on the History and Culture of Wireless Technologies. 3
Lin Tian, Tadao Takaoka: Improved Shortest Path Algorithms For Nearly Acyclic Directed Graphs. 15-24
Sara Drago, Anton Bogdanovych, Massimo Ancona, Simeon J. Simoff, Carles Sierra: From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions. 25-33
Amy Beth Corman, Peter Schachte, Vanessa Teague: QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks. 35-40
Richard Mason, Wayne Kelly: Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework. 41-47
Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska: Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol. 49-58

Henning Köhler: Domination Normal Form - Decomposing Relational Database Schemas. 79-85
Nikolas Askitis, Ranjan Sinha: HAT-Trie: A Cache-Conscious Trie-Based Data Structure For Strings. 97-105
Sandy Citro, Jim McGovern, Caspar Ryan: Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures. 115-124
Grigori Goldman: Periodical Payment Model Using Restricted Proxy Certificates. 131-139
Timo Volkmer, James A. Thom, Seyed M. M. Tahaghoghi: Exploring Human Judgement of Digital Imagery. 151-160
Nicola Ritter, James R. Cooper: Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides. 161-169
Benjamin W. Long, Colin J. Fidge, David A. Carrington: Cross-Layer Verification of Type Flaw Attacks on Security Protocols. 171-180
Chuchang Liu, Angela Billard, Maris A. Ozols, Nikifor Jeremic: Access Control Models and Security Labelling. 181-190
Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto: Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. 191-200

Peter E. Strazdins, Bill Clarke, Andrew Over: Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU. 221-228



