Conferences in DBLP
Ricardo A. Baeza-Yates Web Mining in Search Engines. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:3-4 [Conf ] Steven Garcia , Hugh E. Williams , Adam Cannane Access-Ordered Indexes. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:7-14 [Conf ] Nicholas Lester , Justin Zobel , Hugh E. Williams In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:15-22 [Conf ] Wai Wan Tsang , Lucas Chi Kwong Hui , K. P. Chow , C. F. Chong , Sam C. W. Tso Tuning the Collision Test for Power. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:23-30 [Conf ] Jonathan Billington , Bing Han Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:31-39 [Conf ] Asad Amir Pirzada , Chris McDonald Kerberos Assisted Authentication in Mobile Ad-hoc Networks. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:41-46 [Conf ] Asad Amir Pirzada , Chris McDonald Establishing Trust In Pure Ad-hoc Networks. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:47-54 [Conf ] Gao Song Reducing Register Pressure Through LAER Algorithm. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:55-64 [Conf ] Kylie Williams , Robert Esser Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:65-71 [Conf ] Stephan Flake Towards the Completion of the Formal Semantics of OCL 2.0. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:73-82 [Conf ] S. Jansamak , A. Surarerks Formalization of UML Statechart Models Using Concurrent Regular Expressions. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:83-88 [Conf ] Daniel Powell Automatic Derivation of Loop Termination Conditions to Support Verification. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:89-97 [Conf ] William Brodie-Tyrrell , Henry Detmold , Katrina E. Falkner , David S. Munro Garbage Collection for Storage-Oriented Clusters. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:99-108 [Conf ] Hossam A. ElGindy , George Ferizis On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:109-115 [Conf ] Byung-Hyun Yu , Zhiyi Huang , Stephen Cranefield , Martin K. Purvis Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:117-123 [Conf ] Michael Ciavarella , Alistair Moffat Lossless Image Compression Using Pixel Reordering. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:125-132 [Conf ] Michael Ditze , Peter Altenbernd , Chris Loeser Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:133-142 [Conf ] J. S. Jimmy Li , Sharmil Randhawa Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:143-149 [Conf ] James D. Allert The Effectiveness of Innovative Approaches to CS1: Comparing Opinion to Outcome. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:151-157 [Conf ] Peter Fule , John F. Roddick Detecting Privacy and Ethical Sensitivity in Data Mining Results. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:159-166 [Conf ] James Larkin , Phil Stocks Self-Replicating Expressions in the Lambda Calculus. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:167-173 [Conf ] Catherine Menon , Charles Lakos Towards a Semantic Basis for Rosetta. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:175-184 [Conf ] Leesa Murray , David A. Carrington , Paul A. Strooper An Approach to Specifying Software Frameworks. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:185-192 [Conf ] Graeme Smith A Framework for Modelling and Analysing Mobile Systems. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:193-202 [Conf ] David Cooper , Benjamin Khoo , Brian R. von Konsky , Mike Robey Java Implementation Verification Using Reverse Engineering. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:203-211 [Conf ] Phung Hua Nguyen , Jingling Xue Strength Reduction for Loop-Invariant Types. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:213-222 [Conf ] James Parnis , Gareth Lee Exploiting FPGA Concurrency to Enhance JVM Performance. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:223-232 [Conf ] Richard A. Hagen , Scott D. Goodwin , Abdul Sattar Code Improvements for Model Elimination Based Reasoning Systems. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:233-240 [Conf ] Daniel Jang , Peter A. Whigham , Grant Dick On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:241-247 [Conf ] Feng Lu , Kris Bubendorfer A RMI Protocol for Aglets. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:249-253 [Conf ] Justin Ammerlaan , David Wright Adaptive Cooperative Fuzzy Logic Controller. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:255-263 [Conf ] Graeme Bell , Michael Weir Forward Chaining for Robot and Agent Navigation using Potential Fields. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:265-274 [Conf ] Jan Hoffmann , Uwe Düffert Frequency Space Representation of Transitions of Quadruped Robot Gaits. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:275-278 [Conf ] John H. Hine , Paul Dagger Securing Distributed Computing Against the Hostile Host. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:279-286 [Conf ] Vicky Liu , William J. Caelli , Ernest Foo , Selwyn Russell Visually Sealed and Digitally Signed Documents. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:287-294 [Conf ] Hua Wang , Lili Sun , Yanchun Zhang , Jinli Cao Anonymous Access Scheme for Electronic Services. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:295-304 [Conf ] Trent W. Lewis , David M. W. Powers Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:305-314 [Conf ] George Mitri , Alexandra L. Uitdenbogerd , Vic Ciesielski Automatic Music Classification Problems. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:315-322 [Conf ] Huayang Xie , Peter Andreae , Mengjie Zhang , Paul Warren Learning Models for English Speech Recognition. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:323-329 [Conf ] K. Hogg , P. Chilcott , M. Nolan , B. Srinivasan An Evaluation of Web Services in the Design of a B2B Application. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:331-340 [Conf ] John W. Holford , William J. Caelli , Anthony W. Rhodes Using Self-Defending Objects to Develop Security Aware Applications in Java. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:341-349 [Conf ] Ian D. Mathieson , Sandy Dance , Lin Padgham , Malcolm Gorman An Open Meteorological Alerting System: Issues and Solutions. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:351-358 [Conf ] Anthony H. Dekker , Bernard D. Colbert Network Robustness and Graph Topology. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:359-368 [Conf ] Carsten Friedrich , Falk Schreiber Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:369-376 [Conf ] Kath Mickan , Ronald Morrison , Graham N. C. Kirby Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:377-386 [Conf ]