The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Computer Science Conference (acsc)
2004 (conf/acsc/2004)

  1. Ricardo A. Baeza-Yates
    Web Mining in Search Engines. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:3-4 [Conf]
  2. Steven Garcia, Hugh E. Williams, Adam Cannane
    Access-Ordered Indexes. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:7-14 [Conf]
  3. Nicholas Lester, Justin Zobel, Hugh E. Williams
    In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:15-22 [Conf]
  4. Wai Wan Tsang, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Sam C. W. Tso
    Tuning the Collision Test for Power. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:23-30 [Conf]
  5. Jonathan Billington, Bing Han
    Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:31-39 [Conf]
  6. Asad Amir Pirzada, Chris McDonald
    Kerberos Assisted Authentication in Mobile Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:41-46 [Conf]
  7. Asad Amir Pirzada, Chris McDonald
    Establishing Trust In Pure Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:47-54 [Conf]
  8. Gao Song
    Reducing Register Pressure Through LAER Algorithm. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:55-64 [Conf]
  9. Kylie Williams, Robert Esser
    Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:65-71 [Conf]
  10. Stephan Flake
    Towards the Completion of the Formal Semantics of OCL 2.0. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:73-82 [Conf]
  11. S. Jansamak, A. Surarerks
    Formalization of UML Statechart Models Using Concurrent Regular Expressions. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:83-88 [Conf]
  12. Daniel Powell
    Automatic Derivation of Loop Termination Conditions to Support Verification. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:89-97 [Conf]
  13. William Brodie-Tyrrell, Henry Detmold, Katrina E. Falkner, David S. Munro
    Garbage Collection for Storage-Oriented Clusters. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:99-108 [Conf]
  14. Hossam A. ElGindy, George Ferizis
    On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:109-115 [Conf]
  15. Byung-Hyun Yu, Zhiyi Huang, Stephen Cranefield, Martin K. Purvis
    Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:117-123 [Conf]
  16. Michael Ciavarella, Alistair Moffat
    Lossless Image Compression Using Pixel Reordering. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:125-132 [Conf]
  17. Michael Ditze, Peter Altenbernd, Chris Loeser
    Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:133-142 [Conf]
  18. J. S. Jimmy Li, Sharmil Randhawa
    Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:143-149 [Conf]
  19. James D. Allert
    The Effectiveness of Innovative Approaches to CS1: Comparing Opinion to Outcome. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:151-157 [Conf]
  20. Peter Fule, John F. Roddick
    Detecting Privacy and Ethical Sensitivity in Data Mining Results. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:159-166 [Conf]
  21. James Larkin, Phil Stocks
    Self-Replicating Expressions in the Lambda Calculus. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:167-173 [Conf]
  22. Catherine Menon, Charles Lakos
    Towards a Semantic Basis for Rosetta. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:175-184 [Conf]
  23. Leesa Murray, David A. Carrington, Paul A. Strooper
    An Approach to Specifying Software Frameworks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:185-192 [Conf]
  24. Graeme Smith
    A Framework for Modelling and Analysing Mobile Systems. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:193-202 [Conf]
  25. David Cooper, Benjamin Khoo, Brian R. von Konsky, Mike Robey
    Java Implementation Verification Using Reverse Engineering. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:203-211 [Conf]
  26. Phung Hua Nguyen, Jingling Xue
    Strength Reduction for Loop-Invariant Types. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:213-222 [Conf]
  27. James Parnis, Gareth Lee
    Exploiting FPGA Concurrency to Enhance JVM Performance. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:223-232 [Conf]
  28. Richard A. Hagen, Scott D. Goodwin, Abdul Sattar
    Code Improvements for Model Elimination Based Reasoning Systems. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:233-240 [Conf]
  29. Daniel Jang, Peter A. Whigham, Grant Dick
    On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:241-247 [Conf]
  30. Feng Lu, Kris Bubendorfer
    A RMI Protocol for Aglets. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:249-253 [Conf]
  31. Justin Ammerlaan, David Wright
    Adaptive Cooperative Fuzzy Logic Controller. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:255-263 [Conf]
  32. Graeme Bell, Michael Weir
    Forward Chaining for Robot and Agent Navigation using Potential Fields. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:265-274 [Conf]
  33. Jan Hoffmann, Uwe Düffert
    Frequency Space Representation of Transitions of Quadruped Robot Gaits. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:275-278 [Conf]
  34. John H. Hine, Paul Dagger
    Securing Distributed Computing Against the Hostile Host. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:279-286 [Conf]
  35. Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell
    Visually Sealed and Digitally Signed Documents. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:287-294 [Conf]
  36. Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao
    Anonymous Access Scheme for Electronic Services. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:295-304 [Conf]
  37. Trent W. Lewis, David M. W. Powers
    Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:305-314 [Conf]
  38. George Mitri, Alexandra L. Uitdenbogerd, Vic Ciesielski
    Automatic Music Classification Problems. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:315-322 [Conf]
  39. Huayang Xie, Peter Andreae, Mengjie Zhang, Paul Warren
    Learning Models for English Speech Recognition. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:323-329 [Conf]
  40. K. Hogg, P. Chilcott, M. Nolan, B. Srinivasan
    An Evaluation of Web Services in the Design of a B2B Application. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:331-340 [Conf]
  41. John W. Holford, William J. Caelli, Anthony W. Rhodes
    Using Self-Defending Objects to Develop Security Aware Applications in Java. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:341-349 [Conf]
  42. Ian D. Mathieson, Sandy Dance, Lin Padgham, Malcolm Gorman
    An Open Meteorological Alerting System: Issues and Solutions. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:351-358 [Conf]
  43. Anthony H. Dekker, Bernard D. Colbert
    Network Robustness and Graph Topology. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:359-368 [Conf]
  44. Carsten Friedrich, Falk Schreiber
    Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:369-376 [Conf]
  45. Kath Mickan, Ronald Morrison, Graham N. C. Kirby
    Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:377-386 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002