default search action
23rd ACSC 2000: Canberra, Australia
- 23rd Australasian Computer Science Conference (ACSC 2000), 31 January - 3 February 2000, Canberra, Australia. IEEE Computer Society 2000, ISBN 0-7695-0518-X
- Lilac A. E. Al-Safadi, Janusz R. Getta:
Semantic Modeling for Video Content-Based Retrieval Systems. 2-9 - Tim Bell:
A Low-Cost High-Impact Computer Science Show for Family Audiences. 10-16 - Fred Brown:
Exposing Memory Mapped I/O Using NFS. 17-23 - Barrett R. Bryant:
Object-Oriented Natural Language Requirements Specification. 24-30 - Richard Cole:
Automated Layout of Concept Lattices Using Force Directed Placement and Genetic Algorithms. 31-42 - Robert Colvin, Ian J. Hayes, Paul A. Strooper:
Refining Logic Programs Using Types. 43-50 - James R. Curran, Raymond K. Wong:
Formalization of Transformation-Based Learning. 51-57 - Owen de Kretser, Alistair Moffat:
Needles and Haystacks: A Search Engine for Personal Information Collections. 58-65 - Mark Evered, Gisela Menger, James Leslie Keedy, Axel Schmolitzky:
Software Engineering Despite Object-Orientation. 66-73 - Annegret Goold, Russell Rimmer:
Indicators of Performance in First-year Computing. 74-80 - K. John Gough:
Parameter Passing for the Java Virtual Machine. 81-87 - Paul Gruba, Harald Søndergaard:
Transforming Communication Skills Instruction: The Conference Approach. 88-94 - John C. Grundy:
Storage and Retrieval of Software Components Using Aspects. 95-103 - Bernard K. Gunther:
Facilitating Learning in Advanced Computer Architecture through Appropriate Simulation. 104-112 - Xiangjian He, Tom Hintz:
Refining Edge Detection within Spiral Architecture. 113-119 - John Hildebrandt, Robert Hollamby:
RAPTOR: Rapid Analysis, Processing and Transformation from Online Repositories. 120-127 - David Jeffery, Fergus Henderson, Zoltan Somogyi:
Type Classes in Mercury. 128-135 - Brian Lederer, Valentina Plekhanova, C. Barry Jay:
Teaching a Capstone Subject in Computing Science -- A Variety Engineering Approach. 136-142 - Kevin C. F. Lew, Alfred L. Brown:
A Model of Persistent Software Composition. 143-149 - Chuchang Liu, Maris A. Ozols, Marie Henderson, Anthony Cant:
Towards Certificate Verification in a Certificate Management System. 150-157 - Josef Meyer, Robert Dale:
Building Hybrid Knowledge Representations from Text. 158-165 - Lee Naish:
A Three-Valued Declarative Debugging Scheme. 166-173 - Lee Naish:
A Three-Valued Semantic for Horn Clause Programs. 174-180 - Keith V. Nesbitt, Randall J. Gallimore, Bernard J. Orenstein:
Investigating the Application of Virtual Environment Technology for Use in the Petroleum Exploration Industry. 181-188 - John Potter, James Noble:
Conglomeration -- Realizing Alias Protection. 189-195 - Helen C. Purchase:
Peer Assessment: Encouraging Reflection on Interface Design. 196-203 - Andrew Rock, David Billington:
An Implementation of Propositional Plausible Logic. 204-210 - Nikola B. Serbedzija:
Developing Middleware for Web-Aware Systems: Lessons Learned. 211-219 - Andrew Skabar, Kousick Biswas, Binh Pham, Anthony J. Maeder:
Inductive Concept Learning in the Absence of Labeled Counter-Examples. 220-226 - Graeme Smith:
Stepwise Development from Ideal Specifications. 227-233 - Zili Zhang, Chengqi Zhang:
Result Fusion in Multi-Agent Systems Based on OWA Operator. 234-240 - Justin Zobel, Hugh E. Williams, Sam Kimberley:
Trends in Retrieval System Performance. 241-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.