


default search action
26th ACSC 2003: Adelaide, South Australia
- Michael J. Oudshoorn:

Computer Science 2003, Twenty-Sixth Australasian Computer Science Conference (ACSC2003), Adelaide, South Australia, February 2003. CRPIT 16, Australian Computer Society 2003, ISBN 0-909-92594-1 - Lloyd Allison:

Types and Classes of Machine Learning and Data Mining. 207-215 - Jonathan Billington, Bing Han:

On Defining the Service Provided by TCP. 129-138 - Anna Buttfield:

A New Approach to Rapid Image Morphing for Lip Motion Synthesis. 79-86 - Simon Carter, Malcolm Graham, Paul A. Strooper, Zhiguo Yuan:

Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models. 29-34 - Darin Chan, John F. Roddick:

Context-Sensitive Mobile Database Summarisation. 139-149 - Pauline Lienhua Chou, Xiuzhen Zhang:

Efficiently Computing the Top N Averages in Iceberg Cubes. 101-109 - Voon-Li Chung, Chris McDonald:

Towards Customisable Tuple Field Matching in VLOS. 317-323 - Paul D. Coddington, Lici Lu, Darren Webb, Andrew L. Wendelborn:

Extensible Job Managers for Grid Computing. 151-159 - David J. Crisp, Peter G. Perry, Nicholas J. Redding:

Fast Segmentation of Large Images. 87-93 - Robert Dale, Sabine Geldof, Jean-Philippe Prost:

Using Natural Language Generation for Navigational Assistance. 35-44 - Julian R. Dermoudy:

A Novel Approach to Parenting in Functional Program Evaluation. 217-226 - Hugo A. D. do Nascimento, Peter Eades:

User Hints for Map Labelling. 339-347 - Adam G. Dunn:

Environment-Independent Performance Analyses of Cryptographic Algorithms. 265-274 - Darren Freeman, Greg Knowles:

Hardware Acceleration of JPEG2000 Image Compression for Low-Power Embedded Applications. 325-331 - Richard A. Hagen, Abdul Sattar:

Improving Search in a Hypothetical Reasoning System. 45-53 - René Hexel:

FITS - A Fault Injection Architecture for Time-Triggered Systems. 333-338 - Timothy C. Hoad, Justin Zobel:

Video Similarity Detection for Digital Rights Management. 237-245 - Xiaodi Huang, Wei Lai:

Force-Transfer: A New Approach to Removing Overlapping Nodes in Graph Layout. 349-358 - Nathan Hurst, Kim Marriott, Peter Moulder:

Cobweb: A Constraint-Based WEB Browser. 247-254 - Yan Jin, Robert Esser, Charles Lakos:

Lightweight Consistency Analysis of Dataflow Process Networks. 291-300 - Rilla Khaled, James Noble, Robert Biddle:

InspectJ: Program Monitoring for Visualisation Using AspectJ. 359-368 - Christopher Leckie, Kotagiri Ramamohanarao:

Policies for Sharing Distributed Probabilistic Beliefs. 285-290 - Michael J. Mayo:

Symbol Grounding and its Implications for Artificial Intelligence. 55-60 - Lee Naish:

Approximating the Success Set of Logic Programs Using Constrained Regular Types. 61-67 - Stuart J. Norcross, Ronald Morrison, David S. Munro, Henry Detmold:

Implementing a Family of Distributed Garbage Collectors. 161-170 - Tane Pendragon, Lyndon While:

Path-Planning by Tessellation of Obstacles. 3-9 - Bernard J. Pope, Lee Naish:

A Program Transformation for Debugging Haskell 98. 227-236 - John F. Roddick, Kathleen Hornsby, Denise de Vries:

A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values. 111-118 - Kexing Rui, Gregory Butler:

Refactoring Use Case Models: The Metamodel. 301-308 - Vaughan R. Shanks, Hugh E. Williams, Adam Cannane:

Indexing for Fast Categorisation. 119-127 - Ranjan Sinha, Justin Zobel:

Efficient Trie-Based Sorting of Large Sets of Strings. 11-18 - Trevor C. Tao, David J. Crisp:

A Useful Bound for Region Merging Algorithms in a Bayesian Model. 95-100 - Nghi Truong, Peter Bancroft, Paul Roe:

A Web Based Environment for Learning to Program. 255-264 - Udaya Kiran Tupakula, Vijay Varadharajan:

A Practical Method to Counteract Denial of Service Attacks. 275-284 - Francis Vaughan, Duncan A. Grove, Paul D. Coddington:

Communication Performance Issues for Two Cluster Computers. 171-180 - Bill B. Wang, Robert I. McKay, Hussein A. Abbass, Michael Barlow:

A Comparative Study for Domain Ontology Guided Feature Extraction. 69-78 - Hua Wang

, Jinli Cao, Yanchun Zhang:
A Flexible Payment Scheme and its Permission-Role Assignment. 189-198 - Kirsten Winter, Neil J. Robinson:

Modelling Large Railway Interlockings and Model Checking Small Ones. 309-316 - Liyin Xue, Mehmet A. Orgun, Kang Zhang:

A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors. 19-28 - Yan Zhang, Anna Liu, Wei Qu:

Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf. 199-206 - Ying Zhao, Wanlei Zhou, Elicia Lanham, Shui Yu, Mingjun Lan:

Self-Adaptive Clock Synchronization Based on Clock Precision Difference. 181-187

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














