28. ACSC 2005:
Newcastle,
NSW,
Australia
 Vladimir Estivill-Castro (Ed.):
Computer Science 2005, Twenty-Eighth Australasian Computer Science Conference (ACSC2005), Newcastle, NSW, Australia, January/February 2005.
CRPIT 38 Australian Computer Society 2005, ISBN 1-920682-20-1  
  
  
  
  
 
- Jelita Asian, Hugh E. Williams, Seyed M. M. Tahaghoghi:
 Stemming Indonesian.
307-314
             
- Mihalis Beis, William Duckworth, Michele Zito:
 Large k-Separated Matchings of Random Regular Graphs.
175-182
             
- Regina Berretta, Alexandre Mendes, Pablo Moscato:
 Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data.
361-370
             
- Kris Bubendorfer, John H. Hine:
 Auction Based Resource Negotiation in NOMAD.
297-306
             
- Tri M. Cao, Paul Compton:
 A Simulation Framework for Knowledge Acquisition Evaluation.
353-360
             
- Kelvin Cheng, Masahiro Takatsuka:
 Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction.
125-134
             
- Yang-Wai Chow, Ronald Pose, Matthew Regan:
 Large Object Segmentation with Region Priority Rendering.
19-28
             
- Carl Cook, Neville Churcher:
 Modelling and Measuring Collaborative Software Engineering.
267-276
             
- Dominic Cooney, Marlon Dumas, Paul Roe:
 A Programming Language for Web Service Development.
143-150
             
- Anthony H. Dekker:
 Simulating Network Robustness for Critical Infrastructure Networks.
59-68
             
- Gerry Eisman, Bala Ravikumar:
 Approximate Recognition of Non-regular Languages by Finite Automata.
219-228
             
- Stephen Gilmour, Mark Dras:
 A Two-Pronged Attack on the Dragon of Intractability.
183-192
             
- Erica Glynn, Ian J. Hayes, Anthony MacDonald:
 Integration of generic program analysis tools into a software development environment.
249-258
             
- David Hemer:
 A Formal Approach to Component Adaptation and Composition.
259-266
             
- Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu:
 A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments.
39-48
             
- Xiaodi Huang, Peter Eades, Wei Lai:
 A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization.
87-96
             
- Chris Hunter, Peter Robinson, Paul A. Strooper:
 Agent-Based Distributed Software Verification.
159-164
             
- Henning Köhler:
 A Contraction Algorithm for finding Minimal Feedback Sets.
165-174
             
- Kingsly Leung, Christopher Leckie:
 Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters.
333-342
             
- Ling Li, Vasily Volkov:
 Cloth Animation with Adaptively Refined Meshes.
107-114
             
- Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon:
 A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively.
29-38
             
- Chuchang Liu, Patrick McLean, Maris A. Ozols:
 Combining Logics for Modelling Security Policies.
323-332
             
- Martin H. Luerssen:
 Graph Grammar Encoding and Evolution of Automata Networks.
229-238
             
- Stanislaw P. Maj, G. Kohli, T. Fetherston:
 A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies.
135-142
             
- Kim Marriott, Peter Moulder, Lucas R. Hope, Charles Twardy:
 Layout of Bayesian Networks.
97-106
             
- Damien McAullay, Graham J. Williams, Jie Chen, Huidong Jin:
 A Delivery Framework for Health Data Mining and Analytics.
381-390
             
- Pablo Moscato, Luke Mathieson, Alexandre Mendes, Regina Berretta:
 The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction.
371-380
             
- Gregory Neverov, Paul Roe:
 Towards a Fully-reflective Meta-programming Language.
151-158
             
- Phung Hua Nguyen, Jingling Xue:
 Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading.
9-18
             
- Asad Amir Pirzada, Chris McDonald, Amitava Datta:
 Dependable Dynamic Source Routing without a Trusted Third Party.
79-86
             
- Caspar Ryan, Atish Gonsalves:
 The Effect of Context and Application Type on Mobile Usability: An Empirical Study.
115-124
             
- Abdelsalam Shanneb, John Potter:
 Flexible Exclusion Control for Composite Objects.
277-286
             
- Seyed M. M. Tahaghoghi, Hugh E. Williams, James A. Thom, Timo Volkmer:
 Video Cut Detection using Frame Windows.
193-200
             
- Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham:
 A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights.
209-218
             
- Jeffrey D. Ullman:
 Gradiance On-Line Accelerated Learning.
3-6
             
- Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla:
 A High Performance Kernel-Less Operating System Architecture.
287-296
             
- Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao:
 Authorization Algorithms for the Mobility of User-Role Relationship.
69-78
             
- Huaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian He, Qiang Wu:
 Fractal Image Compression on a Pseudo Spiral Architecture.
201-208
             
- R. Lyndon While, Tony Field:
 Optimising Parallel Pattern-matching by Source-level Program Transformation.
239-248
             
- Ryan Wishart, Ricky Robinson, Jadwiga Indulska:
 SuperstringRep: Reputation-enhanced Service Discovery.
49-58
             
- Yingxin Wu, Masahiro Takatsuka:
 The Geodesic Self-Organizing Map and Its Error Analysis.
343-352
             
- Dongqiang Yang, David M. W. Powers:
 Measuring Semantic Similarity in the Taxonomy of WordNet.
315-322
             
Copyright © Mon Mar 15 03:06:29 2010
 by Michael Ley (ley@uni-trier.de)