|
Conferences in DBLP
- Gerald Quirchmayr
Survivability and Business Continuity Management. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:3-6 [Conf]
- Akito Monden, Antoine Monsifrot, Clark D. Thomborson
A Framework for Obfuscated Interpretation. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:7-16 [Conf]
- John Page, Arkady B. Zaslavsky, Maria Indrawan
A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:17-25 [Conf]
- Clark D. Thomborson, Jasvir Nagra, Ram Somaraju, Charles He
Tamper-proo ng Software Watermarks. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:27-36 [Conf]
- Daniel Bradley, Audun Jøsang
Mesmerize - an open framework for enterprise security management. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:37-42 [Conf]
- Rong Du, Ernest Foo, Colin Boyd, Brian Fitzgerald
Defining Security Services for Electronic Tendering. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:43-52 [Conf]
- Mark Evered, Serge Bögeholz
A Case Study in Access Control Requirements for a Health Information System. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:53-61 [Conf]
- Audun Jøsang, Daniel Bradley, Svein J. Knapskog
Belief-Based Risk Analysis. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:63-68 [Conf]
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
Secure Key Issuing in ID-based Cryptography. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:69-74 [Conf]
- Hung-Min Sun, Bin-Tsan Hsieh
On the Security of Some Proxy Blind Signature Schemes. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:75-78 [Conf]
- Eamonn J. Keogh, Jessica Lin, Stefano Lonardi, Bill Yuan-chi Chiu
We Have Seen the Future, and It Is Symbolic. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:83- [Conf]
- Adam Blazejewski, Richard Coggins
Application of self-organizing maps to clustering of high-frequency Financial data. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:85-90 [Conf]
- Bostjan Brumen, Izidor Golob, Hannu Jaakkola, Tatjana Welzer, Ivan Rozman
Early Assessment of Classification Performance. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:91-96 [Conf]
- Da Deng, Jianhua Zhang, Martin K. Purvis
Visualisation and Comparison of Image Collections based on Self-organised Maps. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:97-102 [Conf]
- Peter Fule, John F. Roddick
Experiences in Building a Tool for Navigating Association Rule Result Sets. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:103-108 [Conf]
- Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady B. Zaslavsky
Cost-Efficient Mining Techniques for Data Streams. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:109-114 [Conf]
- Masahiro Motoyoshi, Takao Miura, Isamu Shioya
Clustering Stream Data by Regression Analysis. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:115-120 [Conf]
- David Parry
A fuzzy ontology for medical document retrieval. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:121-126 [Conf]
- Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin K. Fleurke
Monitoring and controlling of a multi - agent based workflow system. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:127-132 [Conf]
- William D. Smart, Mengjie Zhang
Applying Online Gradient Descent Search to Genetic Programming for Object Recognition. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:133-138 [Conf]
- Brendon J. Woodford, Da Deng, George L. Benwell
A wavelet-based neuro-fuzzy system for data mining small image sets. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:139-143 [Conf]
- Huayang Xie, Peter Andreae, Mengjie Zhang, Paul Warren
Detecting Stress in Spoken English using Decision Trees and Support Vector Machines. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:145-150 [Conf]
- Ahsan Abdullah, Stephen Brobst, Ijaz Pervaiz
Learning Dynamics of Pesticide Abuse through Data Mining. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:151-156 [Conf]
- Jisong Chen, Rowena Chau, Chung-Hsing Yeh
Discovering Parallel Text from the World Wide Web. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:157-161 [Conf]
- Zahidul Islam, Ljiljana Brankovic
A Framework for Privacy Preserving Classification in Data Mining. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:163-168 [Conf]
- Jacky W. W. Wan, Gillian Dobbie
Mining Association Rules from XML Data using XQuery. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:169-174 [Conf]
- QingQing Zhou, Martin K. Purvis
A Market-based Rule Learning System. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:175-180 [Conf]
- Robert Dale
Language Technology and Software Internationalisation. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:185- [Conf]
- James M. Hogan, Chris Ho-Stuart, Bihn Pham
Key Challenges in Software Internationalisation. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:187-194 [Conf]
- Kim Elms
Internationalisation in the Web Services Domain. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:195- [Conf]
- John Richardson
Internationalisation in the Large at Oracle. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:197- [Conf]
- Tony Sahama, Chris Ho-Stuart, James M. Hogan
Developing and Delivering a Software Internationalisation Subject. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:199-204 [Conf]
- Bastin Tony Roy Savarimuthu, Maryam Purvis
Towards a multi-lingual workflow system a practical outlook. [Citation Graph (0, 0)][DBLP] ACSW Frontiers, 2004, pp:205-210 [Conf]
|