Conferences in DBLP
Chris R. Johnson , David M. Weinstein Biomedical computing and visualization. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:3-10 [Conf ] Greg Reeve , Steve Reeves Logic and refinement for charts. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:13-23 [Conf ] Min-Sheng Hsieh , Ewan D. Tempero Supporting software reuse by the individual programmer. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:25-33 [Conf ] Hayden Melton , Ewan D. Tempero Identifying refactoring opportunities by identifying dependency cycles. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:35-41 [Conf ] R. Ian Faulconbridge , Mark R. Pickering , Michael J. Ryan Unsupervised band removal leading to improved classification accuracy of hyperspectral images. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:43-48 [Conf ] Eric H. C. Choi On compensating the Mel-frequency cepstral coefficients for noisy speech recognition. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:49-54 [Conf ] Sergiy A. Vilkomir , David Lorge Parnas , Veena B. Mendiratta , Eamonn Murphy Segregated failures model for availability evaluation of fault-tolerant systems. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:55-61 [Conf ] Suan Khai Chong , Graham Farr , Laura Frost , Simon Hawley On pedagogically sound examples in public-key cryptography. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:63-68 [Conf ] Chuchang Liu , Mehmet A. Orgun Towards security labelling. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:69-76 [Conf ] Ken Tokoro , Kazuaki Yamaguchi , Sumio Masuda Improvements of TLAESA nearest neighbour search algorithm and extension to approximation search. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:77-83 [Conf ] Audun Jøsang , Ross Hayward , Simon Pope Trust network analysis with subjective logic. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:85-94 [Conf ] Bahadorreza Ofoghi , John Yearwood , Ranadhir Ghosh A semantic approach to boost passage retrieval effectiveness for question answering. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:95-101 [Conf ] Lloyd Allison A programming paradigm for machine learning, with a case study of Bayesian networks. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:103-111 [Conf ] Z. Zheng , G. Zhang , Q. He , J. Lu , Z. Shi Rule sets based bilevel decision model. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:113-120 [Conf ] Aniruddha Dasgupta , Aditya K. Ghose CASO: a framework for dealing with objectives in a constraint-based extension to AgentSpeak(L). [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:121-126 [Conf ] S. Cikara , Stanislaw P. Maj , David T. Shaw Modelling layer 2 and layer 3 device bandwidths using B-node theory. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:127-136 [Conf ] Cruz Izu Throughput fairness in k-ary n-cube networks. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:137-145 [Conf ] Feng Lu , Kris Bubendorfer A JMX toolkit for merging network management systems. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:147-156 [Conf ] Hans-Jörg Schulz , Thomas Nocke , Heidrun Schumann A framework for visual data mining of structures. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:157-166 [Conf ] Alex Penev , Raymond Wong Shallow NLP techniques for internet search. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:167-176 [Conf ] Annika Hinze , Yann Michel , Torsten Schlieder Approximative filtering of XML documents in a publish/subscribe system. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:177-185 [Conf ] Anirban Majumdar , Clark D. Thomborson Manufacturing opaque predicates in distributed systems for code obfuscation. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:187-196 [Conf ] Sven Bittner , Annika Hinze Pruning subscriptions in distributed publish/subscribe systems. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:197-206 [Conf ] Annika Hinze , George Buchanan The challenge of creating cooperating mobile services: experiences and lessons learned. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:207-215 [Conf ] Yang-Wai Chow , Ronald Pose , Matthew Regan , James Phillips Human visual perception of region warping distortions. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:217-226 [Conf ] Scott Vallance , Paul R. Calder Rendering multi-perspective images with trilinear projection. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:227-235 [Conf ] Dian Tjondronegoro , Yi-Ping Phoebe Chen , Binh Pham Extensible detection and indexing of highlight events in broadcasted sports video. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:237-246 [Conf ] Timothy J. Everts , Sung Sik Park , Byeong Ho Kang Using formal concept analysis with an incremental knowledge acquisition system for web document management. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:247-256 [Conf ] Annika Hinze , Petra Malik , Robi Malik Interaction design for a mobile context-aware system using discrete event modelling. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:257-266 [Conf ] Carl Cook , Neville Churcher Constructing real-time collaborative software engineering tools using CAISE, an architecture for supporting tool development. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:267-276 [Conf ] Christian Arwin , Seyed M. M. Tahaghoghi Plagiarism detection across programming languages. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:277-286 [Conf ] F. Y. Huang , C. B. Jay , David B. Skillicorn Programming with heterogeneous structures: manipulating XML data using bondi. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:287-295 [Conf ] Clara Murdaca , C. Barry Jay A relational account of objects. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:297-302 [Conf ] Colin J. Fidge , Tim McComb Tracing secure information flow through mode changes. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:303-310 [Conf ] Amit Vasudevan , Ramesh Yerraballi SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:311-320 [Conf ] Hua Wang , Jiuyong Li , Ron Addie , Stijn Dekeyser , Richard Watson A framework for role-based group deligation in distributed environments. [Citation Graph (0, 0)][DBLP ] ACSC, 2006, pp:321-328 [Conf ]