The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Computer Science Conference (acsc)
2005 (conf/acsc/2005)

  1. Jeffrey D. Ullman
    Gradiance On-Line Accelerated Learning. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:3-6 [Conf]
  2. Phung Hua Nguyen, Jingling Xue
    Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:9-18 [Conf]
  3. Yang-Wai Chow, Ronald Pose, Matthew Regan
    Large Object Segmentation with Region Priority Rendering. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:19-28 [Conf]
  4. Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon
    A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:29-38 [Conf]
  5. Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
    A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:39-48 [Conf]
  6. Ryan Wishart, Ricky Robinson, Jadwiga Indulska
    SuperstringRep: Reputation-enhanced Service Discovery. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:49-58 [Conf]
  7. Anthony H. Dekker
    Simulating Network Robustness for Critical Infrastructure Networks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:59-68 [Conf]
  8. Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao
    Authorization Algorithms for the Mobility of User-Role Relationship. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:69-78 [Conf]
  9. Asad Amir Pirzada, Chris McDonald, Amitava Datta
    Dependable Dynamic Source Routing without a Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:79-86 [Conf]
  10. Xiaodi Huang, Peter Eades, Wei Lai
    A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:87-96 [Conf]
  11. Kim Marriott, Peter Moulder, Lucas R. Hope, Charles Twardy
    Layout of Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:97-106 [Conf]
  12. Ling Li, Vasily Volkov
    Cloth Animation with Adaptively Refined Meshes. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:107-114 [Conf]
  13. Caspar Ryan, Atish Gonsalves
    The Effect of Context and Application Type on Mobile Usability: An Empirical Study. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:115-124 [Conf]
  14. Kelvin Cheng, Masahiro Takatsuka
    Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:125-134 [Conf]
  15. Stanislaw P. Maj, G. Kohli, T. Fetherston
    A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:135-142 [Conf]
  16. Dominic Cooney, Marlon Dumas, Paul Roe
    A Programming Language for Web Service Development. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:143-150 [Conf]
  17. Gregory Neverov, Paul Roe
    Towards a Fully-reflective Meta-programming Language. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:151-158 [Conf]
  18. Chris Hunter, Peter Robinson, Paul A. Strooper
    Agent-Based Distributed Software Verification. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:159-164 [Conf]
  19. Henning Köhler
    A Contraction Algorithm for finding Minimal Feedback Sets. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:165-174 [Conf]
  20. Mihalis Beis, William Duckworth, Michele Zito
    Large k-Separated Matchings of Random Regular Graphs. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:175-182 [Conf]
  21. Stephen Gilmour, Mark Dras
    A Two-Pronged Attack on the Dragon of Intractability. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:183-192 [Conf]
  22. Seyed M. M. Tahaghoghi, Hugh E. Williams, James A. Thom, Timo Volkmer
    Video Cut Detection using Frame Windows. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:193-200 [Conf]
  23. Huaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian He, Qiang Wu
    Fractal Image Compression on a Pseudo Spiral Architecture. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:201-208 [Conf]
  24. Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham
    A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:209-218 [Conf]
  25. Gerry Eisman, Bala Ravikumar
    Approximate Recognition of Non-regular Languages by Finite Automata. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:219-228 [Conf]
  26. Martin H. Luerssen
    Graph Grammar Encoding and Evolution of Automata Networks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:229-238 [Conf]
  27. R. Lyndon While, Tony Field
    Optimising Parallel Pattern-matching by Source-level Program Transformation. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:239-248 [Conf]
  28. Erica Glynn, Ian J. Hayes, Anthony MacDonald
    Integration of generic program analysis tools into a software development environment. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:249-258 [Conf]
  29. David Hemer
    A Formal Approach to Component Adaptation and Composition. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:259-266 [Conf]
  30. Carl Cook, Neville Churcher
    Modelling and Measuring Collaborative Software Engineering. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:267-276 [Conf]
  31. Abdelsalam Shanneb, John Potter
    Flexible Exclusion Control for Composite Objects. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:277-286 [Conf]
  32. Amit Vasudevan, Ramesh Yerraballi, Ashish Chawla
    A High Performance Kernel-Less Operating System Architecture. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:287-296 [Conf]
  33. Kris Bubendorfer, John H. Hine
    Auction Based Resource Negotiation in NOMAD. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:297-306 [Conf]
  34. Jelita Asian, Hugh E. Williams, Seyed M. M. Tahaghoghi
    Stemming Indonesian. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:307-314 [Conf]
  35. Dongqiang Yang, David M. W. Powers
    Measuring Semantic Similarity in the Taxonomy of WordNet. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:315-322 [Conf]
  36. Chuchang Liu, Patrick McLean, Maris A. Ozols
    Combining Logics for Modelling Security Policies. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:323-332 [Conf]
  37. Kingsly Leung, Christopher Leckie
    Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:333-342 [Conf]
  38. Yingxin Wu, Masahiro Takatsuka
    The Geodesic Self-Organizing Map and Its Error Analysis. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:343-352 [Conf]
  39. Tri M. Cao, Paul Compton
    A Simulation Framework for Knowledge Acquisition Evaluation. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:353-360 [Conf]
  40. Regina Berretta, Alexandre Mendes, Pablo Moscato
    Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:361-370 [Conf]
  41. Pablo Moscato, Luke Mathieson, Alexandre Mendes, Regina Berretta
    The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:371-380 [Conf]
  42. Damien McAullay, Graham J. Williams, Jie Chen, Huidong Jin
    A Delivery Framework for Health Data Mining and Analytics. [Citation Graph (0, 0)][DBLP]
    ACSC, 2005, pp:381-390 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002