


Остановите войну!
for scientists:


default search action
30th ACSC 2007: Ballarat, Victoria, Australia
- Gillian Dobbie:
Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30 - February 2, 2007. Proceedings. CRPIT 62, Australian Computer Society 2007, ISBN 1-920-68243-0 - Genevieve Bell:
Just Like Magic: Anthropological Musings on the History and Culture of Wireless Technologies. 3 - Kim Marriott, Peter Sbarski:
Compact Layout of Layered Trees. 7-14 - Lin Tian, Tadao Takaoka:
Improved Shortest Path Algorithms For Nearly Acyclic Directed Graphs. 15-24 - Sara Drago, Anton Bogdanovych, Massimo Ancona, Simeon J. Simoff, Carles Sierra:
From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions. 25-33 - Amy Beth Corman, Peter Schachte, Vanessa Teague:
QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks. 35-40 - Richard Mason, Wayne Kelly:
Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework. 41-47 - Asad Amir Pirzada, Marius Portmann, Jadwiga Indulska:
Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol. 49-58 - Ying Zhao, Justin Zobel:
Searching With Style: Authorship Attribution in Classic Literature. 59-68 - Sven Hartmann, Sebastian Link:
On Inferences of Full Hierarchical Dependencies. 69-78 - Henning Köhler:
Domination Normal Form - Decomposing Relational Database Schemas. 79-85 - Hayden Melton, Ewan D. Tempero:
Jooj: Real-Time Support For Avoiding Cyclic Dependencies. 87-95 - Nikolas Askitis, Ranjan Sinha:
HAT-Trie: A Cache-Conscious Trie-Based Data Structure For Strings. 97-105 - Yanan Hao, Yanchun Zhang:
Web Services Discovery Based On Schema Matching. 107-113 - Sandy Citro, Jim McGovern, Caspar Ryan:
Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures. 115-124 - Jian Song, Yanchun Zhang:
Architecture of a Web Accelerator For Wireless Networks. 125-129 - Grigori Goldman:
Periodical Payment Model Using Restricted Proxy Certificates. 131-139 - Joel Fenwick, Vladimir Estivill-Castro:
Mutually Visible Agents in a Discrete Environment. 141-150 - Timo Volkmer, James A. Thom, Seyed M. M. Tahaghoghi:
Exploring Human Judgement of Digital Imagery. 151-160 - Nicola Ritter, James R. Cooper:
Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides. 161-169 - Benjamin W. Long, Colin J. Fidge, David A. Carrington:
Cross-Layer Verification of Type Flaw Attacks on Security Protocols. 171-180 - Chuchang Liu, Angela Billard, Maris A. Ozols, Nikifor Jeremic:
Access Control Models and Security Labelling. 181-190 - Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. 191-200 - Hayden Melton, Ewan D. Tempero:
The CRSS Metric for Package Design Quality. 201-210 - Kelvin Choi, Ewan D. Tempero:
Dynamic Measurement of Polymorphism. 211-220 - Peter E. Strazdins, Bill Clarke, Andrew Over:
Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU. 221-228

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.