


default search action
27th ACSC 2004: Dunedin, New Zealand
- Vladimir Estivill-Castro:

Computer Science 2004, Twenty-Seveth Australasian Computer Science Conference (ACSC2004), Dunedin, New Zealand, January 2004. CRPIT 26, Australian Computer Society 2004, ISBN 1-920682-05-8 - James D. Allert:

The Effectiveness of Innovative Approaches to CS1: Comparing Opinion to Outcome. 151-157 - Justin Ammerlaan, David Wright:

Adaptive Cooperative Fuzzy Logic Controller. 255-263 - Ricardo A. Baeza-Yates:

Web Mining in Search Engines. 3-4 - Graeme Bell, Michael Weir:

Forward Chaining for Robot and Agent Navigation using Potential Fields. 265-274 - Jonathan Billington, Bing Han:

Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels. 31-39 - William Brodie-Tyrrell, Henry Detmold, Katrina Falkner, David S. Munro:

Garbage Collection for Storage-Oriented Clusters. 99-108 - Michael Ciavarella, Alistair Moffat:

Lossless Image Compression Using Pixel Reordering. 125-132 - David J. A. Cooper, Benjamin Khoo, Brian R. von Konsky, Mike Robey:

Java Implementation Verification Using Reverse Engineering. 203-211 - Anthony H. Dekker, Bernard D. Colbert:

Network Robustness and Graph Topology. 359-368 - Michael Ditze, Peter Altenbernd, Chris Loeser:

Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices. 133-142 - Hossam A. ElGindy, George Ferizis:

On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm. 109-115 - Stephan Flake:

Towards the Completion of the Formal Semantics of OCL 2.0. 73-82 - Carsten Friedrich, Falk Schreiber:

Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size. 369-376 - Peter Fule, John F. Roddick:

Detecting Privacy and Ethical Sensitivity in Data Mining Results. 159-166 - Steven Garcia, Hugh E. Williams, Adam Cannane:

Access-Ordered Indexes. 7-14 - Richard A. Hagen, Scott D. Goodwin, Abdul Sattar:

Code Improvements for Model Elimination Based Reasoning Systems. 233-240 - John H. Hine, Paul Dagger:

Securing Distributed Computing Against the Hostile Host. 279-286 - Jan Hoffmann, Uwe Düffert:

Frequency Space Representation of Transitions of Quadruped Robot Gaits. 275-278 - K. Hogg, P. Chilcott, M. Nolan, B. Srinivasan:

An Evaluation of Web Services in the Design of a B2B Application. 331-340 - John W. Holford, William J. Caelli, Anthony W. Rhodes:

Using Self-Defending Objects to Develop Security Aware Applications in Java. 341-349 - Daniel Jang, Peter A. Whigham, Grant Dick:

On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma. 241-247 - S. Jansamak, Athasit Surarerks:

Formalization of UML Statechart Models Using Concurrent Regular Expressions. 83-88 - James Larkin, Phil Stocks:

Self-Replicating Expressions in the Lambda Calculus. 167-173 - Nicholas Lester, Justin Zobel, Hugh E. Williams:

In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems. 15-22 - Trent W. Lewis, David M. W. Powers:

Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition. 305-314 - J. S. Jimmy Li, Sharmil Randhawa:

Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images. 143-149 - Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell:

Visually Sealed and Digitally Signed Documents. 287-294 - Feng Lu, Kris Bubendorfer:

A RMI Protocol for Aglets. 249-253 - Ian D. Mathieson, Sandy Dance, Lin Padgham, Malcolm Gorman:

An Open Meteorological Alerting System: Issues and Solutions. 351-358 - Catherine Menon, Charles Lakos:

Towards a Semantic Basis for Rosetta. 175-184 - Kath Mickan, Ronald Morrison, Graham N. C. Kirby:

Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems. 377-386 - George Mitri, Alexandra L. Uitdenbogerd, Victor Ciesielski:

Automatic Music Classification Problems. 315-322 - Leesa Murray, David A. Carrington, Paul A. Strooper:

An Approach to Specifying Software Frameworks. 185-192 - Phung Hua Nguyen, Jingling Xue:

Strength Reduction for Loop-Invariant Types. 213-222 - James Parnis, Gareth Lee:

Exploiting FPGA Concurrency to Enhance JVM Performance. 223-232 - Asad Amir Pirzada, Chris McDonald:

Kerberos Assisted Authentication in Mobile Ad-hoc Networks. 41-46 - Asad Amir Pirzada, Chris McDonald:

Establishing Trust In Pure Ad-hoc Networks. 47-54 - Daniel Powell:

Automatic Derivation of Loop Termination Conditions to Support Verification. 89-97 - Graeme Smith:

A Framework for Modelling and Analysing Mobile Systems. 193-202 - Gao Song:

Reducing Register Pressure Through LAER Algorithm. 55-64 - Wai Wan Tsang, Lucas Chi Kwong Hui, Kam-Pui Chow, C. F. Chong, Sam C. W. Tso:

Tuning the Collision Test for Power. 23-30 - Hua Wang

, Lili Sun, Yanchun Zhang, Jinli Cao:
Anonymous Access Scheme for Electronic Services. 295-304 - Kylie Williams, Robert Esser:

Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking. 65-71 - Huayang Xie, Peter Andreae, Mengjie Zhang, Paul Warren:

Learning Models for English Speech Recognition. 323-329 - Byung-Hyun Yu, Zhiyi Huang, Stephen Cranefield, Martin K. Purvis:

Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory. 117-123

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














