The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Computer Science Conference (acsc)
2007 (conf/acsc/2007)


  1. Just Like Magic: Anthropological Musings on the History and Culture of Wireless Technologies. [Citation Graph (, )][DBLP]


  2. Compact Layout of Layered Trees. [Citation Graph (, )][DBLP]


  3. Improved Shortest Path Algorithms For Nearly Acyclic Directed Graphs. [Citation Graph (, )][DBLP]


  4. From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions. [Citation Graph (, )][DBLP]


  5. QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks. [Citation Graph (, )][DBLP]


  6. Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework. [Citation Graph (, )][DBLP]


  7. Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol. [Citation Graph (, )][DBLP]


  8. Searching With Style: Authorship Attribution in Classic Literature. [Citation Graph (, )][DBLP]


  9. On Inferences of Full Hierarchical Dependencies. [Citation Graph (, )][DBLP]


  10. Domination Normal Form - Decomposing Relational Database Schemas. [Citation Graph (, )][DBLP]


  11. Jooj: Real-Time Support For Avoiding Cyclic Dependencies. [Citation Graph (, )][DBLP]


  12. HAT-Trie: A Cache-Conscious Trie-Based Data Structure For Strings. [Citation Graph (, )][DBLP]


  13. Web Services Discovery Based On Schema Matching. [Citation Graph (, )][DBLP]


  14. Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures. [Citation Graph (, )][DBLP]


  15. Architecture of a Web Accelerator For Wireless Networks. [Citation Graph (, )][DBLP]


  16. Periodical Payment Model Using Restricted Proxy Certificates. [Citation Graph (, )][DBLP]


  17. Mutually Visible Agents in a Discrete Environment. [Citation Graph (, )][DBLP]


  18. Exploring Human Judgement of Digital Imagery. [Citation Graph (, )][DBLP]


  19. Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides. [Citation Graph (, )][DBLP]


  20. Cross-Layer Verification of Type Flaw Attacks on Security Protocols. [Citation Graph (, )][DBLP]


  21. Access Control Models and Security Labelling. [Citation Graph (, )][DBLP]


  22. Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. [Citation Graph (, )][DBLP]


  23. The CRSS Metric for Package Design Quality. [Citation Graph (, )][DBLP]


  24. Dynamic Measurement of Polymorphism. [Citation Graph (, )][DBLP]


  25. Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002