The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Computer Science Conference (acsc)
2006 (conf/acsc/2006)

  1. Chris R. Johnson, David M. Weinstein
    Biomedical computing and visualization. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:3-10 [Conf]
  2. Greg Reeve, Steve Reeves
    Logic and refinement for charts. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:13-23 [Conf]
  3. Min-Sheng Hsieh, Ewan D. Tempero
    Supporting software reuse by the individual programmer. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:25-33 [Conf]
  4. Hayden Melton, Ewan D. Tempero
    Identifying refactoring opportunities by identifying dependency cycles. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:35-41 [Conf]
  5. R. Ian Faulconbridge, Mark R. Pickering, Michael J. Ryan
    Unsupervised band removal leading to improved classification accuracy of hyperspectral images. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:43-48 [Conf]
  6. Eric H. C. Choi
    On compensating the Mel-frequency cepstral coefficients for noisy speech recognition. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:49-54 [Conf]
  7. Sergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy
    Segregated failures model for availability evaluation of fault-tolerant systems. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:55-61 [Conf]
  8. Suan Khai Chong, Graham Farr, Laura Frost, Simon Hawley
    On pedagogically sound examples in public-key cryptography. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:63-68 [Conf]
  9. Chuchang Liu, Mehmet A. Orgun
    Towards security labelling. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:69-76 [Conf]
  10. Ken Tokoro, Kazuaki Yamaguchi, Sumio Masuda
    Improvements of TLAESA nearest neighbour search algorithm and extension to approximation search. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:77-83 [Conf]
  11. Audun Jøsang, Ross Hayward, Simon Pope
    Trust network analysis with subjective logic. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:85-94 [Conf]
  12. Bahadorreza Ofoghi, John Yearwood, Ranadhir Ghosh
    A semantic approach to boost passage retrieval effectiveness for question answering. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:95-101 [Conf]
  13. Lloyd Allison
    A programming paradigm for machine learning, with a case study of Bayesian networks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:103-111 [Conf]
  14. Z. Zheng, G. Zhang, Q. He, J. Lu, Z. Shi
    Rule sets based bilevel decision model. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:113-120 [Conf]
  15. Aniruddha Dasgupta, Aditya K. Ghose
    CASO: a framework for dealing with objectives in a constraint-based extension to AgentSpeak(L). [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:121-126 [Conf]
  16. S. Cikara, Stanislaw P. Maj, David T. Shaw
    Modelling layer 2 and layer 3 device bandwidths using B-node theory. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:127-136 [Conf]
  17. Cruz Izu
    Throughput fairness in k-ary n-cube networks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:137-145 [Conf]
  18. Feng Lu, Kris Bubendorfer
    A JMX toolkit for merging network management systems. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:147-156 [Conf]
  19. Hans-Jörg Schulz, Thomas Nocke, Heidrun Schumann
    A framework for visual data mining of structures. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:157-166 [Conf]
  20. Alex Penev, Raymond Wong
    Shallow NLP techniques for internet search. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:167-176 [Conf]
  21. Annika Hinze, Yann Michel, Torsten Schlieder
    Approximative filtering of XML documents in a publish/subscribe system. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:177-185 [Conf]
  22. Anirban Majumdar, Clark D. Thomborson
    Manufacturing opaque predicates in distributed systems for code obfuscation. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:187-196 [Conf]
  23. Sven Bittner, Annika Hinze
    Pruning subscriptions in distributed publish/subscribe systems. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:197-206 [Conf]
  24. Annika Hinze, George Buchanan
    The challenge of creating cooperating mobile services: experiences and lessons learned. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:207-215 [Conf]
  25. Yang-Wai Chow, Ronald Pose, Matthew Regan, James Phillips
    Human visual perception of region warping distortions. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:217-226 [Conf]
  26. Scott Vallance, Paul R. Calder
    Rendering multi-perspective images with trilinear projection. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:227-235 [Conf]
  27. Dian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham
    Extensible detection and indexing of highlight events in broadcasted sports video. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:237-246 [Conf]
  28. Timothy J. Everts, Sung Sik Park, Byeong Ho Kang
    Using formal concept analysis with an incremental knowledge acquisition system for web document management. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:247-256 [Conf]
  29. Annika Hinze, Petra Malik, Robi Malik
    Interaction design for a mobile context-aware system using discrete event modelling. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:257-266 [Conf]
  30. Carl Cook, Neville Churcher
    Constructing real-time collaborative software engineering tools using CAISE, an architecture for supporting tool development. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:267-276 [Conf]
  31. Christian Arwin, Seyed M. M. Tahaghoghi
    Plagiarism detection across programming languages. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:277-286 [Conf]
  32. F. Y. Huang, C. B. Jay, David B. Skillicorn
    Programming with heterogeneous structures: manipulating XML data using bondi. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:287-295 [Conf]
  33. Clara Murdaca, C. Barry Jay
    A relational account of objects. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:297-302 [Conf]
  34. Colin J. Fidge, Tim McComb
    Tracing secure information flow through mode changes. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:303-310 [Conf]
  35. Amit Vasudevan, Ramesh Yerraballi
    SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:311-320 [Conf]
  36. Hua Wang, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson
    A framework for role-based group deligation in distributed environments. [Citation Graph (0, 0)][DBLP]
    ACSC, 2006, pp:321-328 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002