default search action
26th ACSC 2003: Adelaide, South Australia
- Michael J. Oudshoorn:
Computer Science 2003, Twenty-Sixth Australasian Computer Science Conference (ACSC2003), Adelaide, South Australia, February 2003. CRPIT 16, Australian Computer Society 2003, ISBN 0-909-92594-1 - Lloyd Allison:
Types and Classes of Machine Learning and Data Mining. 207-215 - Jonathan Billington, Bing Han:
On Defining the Service Provided by TCP. 129-138 - Anna Buttfield:
A New Approach to Rapid Image Morphing for Lip Motion Synthesis. 79-86 - Simon Carter, Malcolm Graham, Paul A. Strooper, Zhiguo Yuan:
Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models. 29-34 - Darin Chan, John F. Roddick:
Context-Sensitive Mobile Database Summarisation. 139-149 - Pauline Lienhua Chou, Xiuzhen Zhang:
Efficiently Computing the Top N Averages in Iceberg Cubes. 101-109 - Voon-Li Chung, Chris McDonald:
Towards Customisable Tuple Field Matching in VLOS. 317-323 - Paul D. Coddington, Lici Lu, Darren Webb, Andrew L. Wendelborn:
Extensible Job Managers for Grid Computing. 151-159 - David J. Crisp, Peter G. Perry, Nicholas J. Redding:
Fast Segmentation of Large Images. 87-93 - Robert Dale, Sabine Geldof, Jean-Philippe Prost:
Using Natural Language Generation for Navigational Assistance. 35-44 - Julian R. Dermoudy:
A Novel Approach to Parenting in Functional Program Evaluation. 217-226 - Hugo A. D. do Nascimento, Peter Eades:
User Hints for Map Labelling. 339-347 - Adam G. Dunn:
Environment-Independent Performance Analyses of Cryptographic Algorithms. 265-274 - Darren Freeman, Greg Knowles:
Hardware Acceleration of JPEG2000 Image Compression for Low-Power Embedded Applications. 325-331 - Richard A. Hagen, Abdul Sattar:
Improving Search in a Hypothetical Reasoning System. 45-53 - René Hexel:
FITS - A Fault Injection Architecture for Time-Triggered Systems. 333-338 - Timothy C. Hoad, Justin Zobel:
Video Similarity Detection for Digital Rights Management. 237-245 - Xiaodi Huang, Wei Lai:
Force-Transfer: A New Approach to Removing Overlapping Nodes in Graph Layout. 349-358 - Nathan Hurst, Kim Marriott, Peter Moulder:
Cobweb: A Constraint-Based WEB Browser. 247-254 - Yan Jin, Robert Esser, Charles Lakos:
Lightweight Consistency Analysis of Dataflow Process Networks. 291-300 - Rilla Khaled, James Noble, Robert Biddle:
InspectJ: Program Monitoring for Visualisation Using AspectJ. 359-368 - Christopher Leckie, Kotagiri Ramamohanarao:
Policies for Sharing Distributed Probabilistic Beliefs. 285-290 - Michael J. Mayo:
Symbol Grounding and its Implications for Artificial Intelligence. 55-60 - Lee Naish:
Approximating the Success Set of Logic Programs Using Constrained Regular Types. 61-67 - Stuart J. Norcross, Ronald Morrison, David S. Munro, Henry Detmold:
Implementing a Family of Distributed Garbage Collectors. 161-170 - Tane Pendragon, Lyndon While:
Path-Planning by Tessellation of Obstacles. 3-9 - Bernard J. Pope, Lee Naish:
A Program Transformation for Debugging Haskell 98. 227-236 - John F. Roddick, Kathleen Hornsby, Denise de Vries:
A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values. 111-118 - Kexing Rui, Gregory Butler:
Refactoring Use Case Models: The Metamodel. 301-308 - Vaughan R. Shanks, Hugh E. Williams, Adam Cannane:
Indexing for Fast Categorisation. 119-127 - Ranjan Sinha, Justin Zobel:
Efficient Trie-Based Sorting of Large Sets of Strings. 11-18 - Trevor C. Tao, David J. Crisp:
A Useful Bound for Region Merging Algorithms in a Bayesian Model. 95-100 - Nghi Truong, Peter Bancroft, Paul Roe:
A Web Based Environment for Learning to Program. 255-264 - Udaya Kiran Tupakula, Vijay Varadharajan:
A Practical Method to Counteract Denial of Service Attacks. 275-284 - Francis Vaughan, Duncan A. Grove, Paul D. Coddington:
Communication Performance Issues for Two Cluster Computers. 171-180 - Bill B. Wang, Robert I. McKay, Hussein A. Abbass, Michael Barlow:
A Comparative Study for Domain Ontology Guided Feature Extraction. 69-78 - Hua Wang, Jinli Cao, Yanchun Zhang:
A Flexible Payment Scheme and its Permission-Role Assignment. 189-198 - Kirsten Winter, Neil J. Robinson:
Modelling Large Railway Interlockings and Model Checking Small Ones. 309-316 - Liyin Xue, Mehmet A. Orgun, Kang Zhang:
A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors. 19-28 - Yan Zhang, Anna Liu, Wei Qu:
Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf. 199-206 - Ying Zhao, Wanlei Zhou, Elicia Lanham, Shui Yu, Mingjun Lan:
Self-Adaptive Clock Synchronization Based on Clock Precision Difference. 181-187
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.