Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

We wish you a happy and safe holiday season and all the best for 2025


Published Papers by Author

Listed below are all authors published in the conference series so far. Next to each name is the volume number(s) in which their paper(s) appear.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Top of List

A

  • Aa, Tom Vander - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
  • Aalst, Wil M.P. van der - When are two Workflows the Same?, in Volume 41;
  • Abawajy, Jemal H. - Communication Network Analysis of the Enterprise Grid Systems, in Volume 68;
  • Abbass, Hussein A. - A Comparative Study for Domain Ontology Guided Feature Extraction, in Volume 16;
  • Abd Rozan, Mohd Zaidi - Multilingual ICT Education: Language Observatory as a Monitoring Instrument, in Volume 46;
  • Abdul Kareem, Sameem - An ontology-based approach for resolving semantic schema conflicts in the extraction and integration of query-based information from heterogeneous web data sources, in Volume 85;
  • Abdullah, Ahsan - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
  • Abraham, Tamas - Event Sequence Mining to Develop Profiles for Computer Forensic Investigation Purposes, in Volume 54;
  • Abramson, David - Optimizing Tunneled Grid Connectivity across Firewalls, in Volume 99;
  • Abu Bakar, Ahmad Zaki - Multilingual ICT Education: Language Observatory as a Monitoring Instrument, in Volume 46;
  • Achuthan, N. R. - A Bottom-Up Projection Based Algorithm for Mining High Utility Itemsets, in Volume 84;
  • Acquaah-Gaisie, Gerald - Economic development via the Net in Oceania, in Volume 1;
  • Adams, Brett - Indoor Location Prediction Using Multiple Wireless Received Signal Strengths, in Volume 87;
  • Adams, Michael - Developing Case Studies to Enhance Student Learning, in Volume 42;
  • Adams, Peter - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
  • Adcock, Matt - AreWeThereYet? - A Temporally Aware Media Player, in Volume 76;
  • Addie, Ron - A Framework for Role-based group delegation in distributed environment, in Volume 48; - Peer-to-Peer Form Based Web Information Systems, in Volume 49;
  • Ager, Rachel - Getting it Right From the Start: A Case Study of the Development of a Foundation Stage Learning and ICT Strategy in Northamptonshire, UK, in Volume 34;
  • Ahmad, Mohammad Nazir - Managing Ontologies: A Comparative Study of Ontology Servers, in Volume 63;
  • Ahmad, Muhammad - Modeling Proliferation of Ideas in Online Social Networks, in Volume 61;
  • Ahmed, Adel - Automatic Camera Path Generation for Graph Navigation in 3D, in Volume 45;
  • Ahmed, Chowdhury Farhan - ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns, in Volume 87;
  • Ahmed, Mobin Uddin - Intelligent Cache Management for Data Grid, in Volume 44;
  • Ahn, Hee-Kap - Constructing Optimal Highways, in Volume 65;
  • Ahoniemi, Tuukka - Effectiveness of integrating program visualizations to a programming course, in Volume 88; - Fighting the student dropout rate with an incremental programming assignment, in Volume 88; - Why should we bore students when teaching CS?, in Volume 88;
  • Ahsan, Nasir - Learning Causal Networks from Microarray Data, in Volume 73;
  • Akand, Elma - Learning from Ontological Annotation : an Application of Formal Concept Analysis to Feature Construction in the Gene Ontology, in Volume 85;
  • Akbari, Mohammad K. - Communication Network Analysis of the Enterprise Grid Systems, in Volume 68;
  • Akiyama, Toyokazu - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
  • Akoka, Jacky - Perceived vs. Measured Quality of Conceptual Schemas: An Experimental Comparison, in Volume 83;
  • Aksoy, Hakan - Mining for offender group detection and story of a police operation, in Volume 70;
  • Akutsu, Tatsuya - Protein Side-chain Packing Problem: A Maximum Edge-weight Clique Algorithmic Approach, in Volume 29;
  • Al Zomai, Muhammed - Usability and Privacy in Identity Management Architectures, in Volume 68;
  • Al-Fedaghi, Sabah S. - Beyond Purpose-Based Privacy Access Control, in Volume 63;
  • Al-Mahmood, Reem - Strategies for Communication Skills Development, in Volume 30;
  • Al-Oqaily, Ahmad - Comparison of Visualization Methods of Genome-wide SNP Profiles in Childhood Acute Lymphoblastic Leukaemia, in Volume 87; - Using a Kernel-Based Approach to Visualize Integrated Chronic Fatigue Syndrome Datasets, in Volume 61;
  • Al-Saggaf, Yeslam - Introduction - Computers and Philosophy, in Volume 37;
  • Al-Wasil, Fahad M. - Establishing an XML Metadata Knowledge Base to Assist Integration of Structured and Semi-structured Databases, in Volume 49;
  • Alachaher, Leila Nemmiche - Visualization of Attractive and Repulsive Zones Between Variables, in Volume 61;
  • Albertyn, Frina - An e-Process Selection Model, in Volume 83;
  • Alcalde, Baptiste - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
  • Alfayyadh, Bander - An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems, in Volume 81; - Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign, in Volume 81;
  • Algur, Siddu P. - Extraction of Flat and Nested Data Records from Web Pages, in Volume 61;
  • Alhadi, Arifah Che - Extracting and Modeling the Semantic Information Content of Web Documents to Support Semantic Document Retrieval, in Volume 96;
  • Aljasser, Khalid - ParaAJ: toward Reusable and Maintainable Aspect Oriented Programs, in Volume 91;
  • Allan, Jeff - UK e-Science Pilot Project DAME: Context, Lessons Learned and Future, in Volume 44;
  • Allen, John G. - Code Generation for Just-in-Time Compiled Mobile Collector Agents, in Volume 22; - Enhancing Screen Teleconferencing with Streaming SIMD Extensions, in Volume 11; - Object Tracking Using CamShift Algorithm and Multiple Quantized Feature Spaces, in Volume 36; - Robust Real-Time Tracking of Non-Rigid Objects, in Volume 36;
  • Allender, Eric - Chipping Away at P vs NP: How Far Are We from Proving Circuit Size Lower Bounds?, in Volume 77;
  • Allert, James D. - The Effectiveness of Innovative Approaches to CS1: Comparing Opinion to Outcome, in Volume 26;
  • Allison, Lloyd - A Programming Paradigm for Machine Learning, with a Case Study of Bayesian Networks, in Volume 48; - Types and Classes of Machine Learning and Data Mining, in Volume 16;
  • Allsman, Roberta - Integrating The MACHO Data-set with the Virtual Observatory, in Volume 44;
  • Allwright, Alan - Exploratory Mining over Organisational Communications Data, in Volume 87;
  • Alt, Helmut - Constructing Optimal Highways, in Volume 65;
  • Altenbernd, Peter - Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices, in Volume 26;
  • Altenkirch, Thorsten - Constructing Strictly Positive Families, in Volume 65;
  • Altman, Tom - Structure-Based Document Model with Discrete Wavelet Transforms and Its Application to Document Classification, in Volume 87;
  • Altmann, Josef - A Component-Based Application Framework for Manufacturing Execution Systems in C# and .NET, in Volume 10;
  • Altmanninger, Kerstin - Towards Accurate Conflict Detection in a VCS for Model Artifacts: A Comparison of Two Semantically Enhanced Approaches, in Volume 96;
  • Alvares, Luis Otavio - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83;
  • Alzaid, Hani - Secure Data Aggregation in Wireless Sensor Network: a survey, in Volume 81;
  • AlZomai, Mohammed - An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems, in Volume 81;
  • AlZoubi, Omar - Classification of Brain-Computer Interface Data, in Volume 87;
  • Amagasa, Toshiyuki - A Path-based Relational RDF Database, in Volume 39;
  • Amann, Philipp - Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing, in Volume 21;
  • Amaral, Fernando N. - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
  • Ambikairajah, Eliathamby - Visualisation of Reduced-Dimension Microarray Data Using Gaussian Mixture Models, in Volume 45;
  • Ambroise, C. - On the Simultaneous Use of Clinical and Microarray Expression Data in the Cluster Analysis of Tissue Samples, in Volume 29;
  • Amer, Taher - Evaluating Swiftpoint as a Mobile Device for Direct Manipulation Input, in Volume 64;
  • Amirbekyan, Artak - A New Efficient Privacy-Preserving Scalar Product Protocol, in Volume 70; - The Privacy of k-NN Retrieval for Horizontal Partitioned Data - New Methods and Applications, in Volume 63;
  • Ammerlaan, Justin - Adaptive Cooperative Fuzzy Logic Controller, in Volume 26;
  • An, Jiyuan - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
  • Analoui, M. - Grid-JQA : Grid Java based Quality of service management by Active database, in Volume 54;
  • Ancona, Massimo - From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
  • Anderson, Kevin - A risk-based approach to supporting the operator role in complex monitoring systems, in Volume 86;
  • Anderson, Kevin J. - SIL Rating Fire Protection Equipment, in Volume 33;
  • Andrade, Marcus Vinicius Alvim - Improving Productivity and Quality of GIS Databases Design using an Analysis Pattern Catalog, in Volume 43;
  • Andreae, Peter - Detecting Stress in Spoken English using Decision Trees and Support Vector Machines, in Volume 32; - HOPPER: a hierarchical planning agent for unpredictable domains, in Volume 91; - Learning Models for English Speech Recognition, in Volume 26; - S.E.A.L. - A Query Language for Entity-Association Queries, in Volume 92;
  • Ang, Russell - Predictive Model of Insolvency Risk for Australian Corporations, in Volume 70;
  • Anh, Vo - Phylogenetic Tree of Prokaryotes Based on the Complete Genomes using Fractal and Correlation Analyses, in Volume 29;
  • Anh, Vo Ngoc - Improved Retrieval Effectiveness Through Impact Transformation, in Volume 5; - Index Compression Using Fixed Binary Codewords, in Volume 27;
  • Ankcorn, John - Lightweight User Interfaces for Watch Based Displays, in Volume 40;
  • Anslow, Craig - Aspects to Visualising Reusable Components, in Volume 24; - XML Database Support for Program Trace Visualisation, in Volume 35;
  • Antonie, Maria-Luiza - Classifying Text Documents by Associating Terms With Text Categories, in Volume 5;
  • Aparicio, Adriana S. - Applying Ontologies in the Integration of Heterogeneous Relational Databases, in Volume 58;
  • Apperley, Mark - Computer-Aided Sketching to Capture Preliminary Design, in Volume 7; - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
  • Arai, Masato - Proposal for Effective Information Flow Control Model for Sharing and Protecting Sensitive Information, in Volume 98;
  • Arbelaitz, Olatz - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87; - Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
  • Archer, David W. - Capturing Users' Everyday, Implicit Information Integration Decisions, in Volume 83;
  • Ardagh, David - Public Education in Computer Usage: An Ethico-Political Rationale, in Volume 1;
  • Aritsugi, Masayoshi - Performance Evaluation of Combining Data Migration and Method Migration in Object Database Environments, in Volume 5;
  • Arjunan, Sridhar P. - Vowel recognition of English and German language using Facial movement(SEMG) for Speech control based HCI, in Volume 56;
  • Arjunan, Sridhar Poosapadi - Voiceless Speech Recognition Using Dynamic Visual Speech Features, in Volume 56;
  • Armstrong, Helen - A Computing Education Vision for the Sight Impaired, in Volume 30;
  • Armstrong, Leisa - The application of data mining techniques to characterize agricultural soil profiles, in Volume 70;
  • Arnott, David - A Studio-Based Approach to Teaching Information Technology, in Volume 8;
  • Arvo, James - Fluid Sketching of Directed Graphs, in Volume 50;
  • Arvola, Mattias - Lessons Learned from Facilitation in Collaborative Design, in Volume 64;
  • Arwin, Christian - Plagiarism Detection across Programming Languages, in Volume 48;
  • Asahiro, Yuichi - Graph Classes and the Complexity of the Graph Orientation Minimizing the Maximum Weighted Outdegree, in Volume 77; - Graph Orientation Algorithms to Minimize the Maximum Outdegree, in Volume 51;
  • Asano, Tetsuo - Computational Geometric and Combinatorial Approaches to Digital Halftoning, in Volume 51; - Constructing Optimal Highways, in Volume 65;
  • Asheibi, Ali - Analyzing Harmonic Monitoring Data Using Data Mining, in Volume 61;
  • Asian, Jelita - Stemming Indonesian, in Volume 38;
  • Askitis, Nikolas - Fast and Compact Hash Tables for Integer Keys, in Volume 91; - HAT-Trie: A Cache-Conscious Trie-Based Data Structure For Strings, in Volume 62;
  • Asquith, Matthew - An ILP for the metro-line crossing problem, in Volume 77;
  • Atallah, Mikhail J. - A Survey of Watermarking Techniques for Non-Media Digital Objects, in Volume 44; - Remote Revocation of Smart Cards in a Private DRM System, in Volume 44;
  • Atchison, Brenton - A Product-Based Assurance Model for Mixed-Integrity Markets, in Volume 15; - Revision of Australian Defence Standard Def (Aust) 5679, in Volume 55;
  • Atkinson, Ian - Supporting Coral Reef Ecosystems Research through Modelling Re-usable Ontologies, in Volume 90;
  • Atkinson, Ian M. - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68; - The Semantic Reef: Managing Complex Knowledge to Predict Coral Bleaching on the Great Barrier Reef, in Volume 68; - YourSRB: A cross platform interface for SRB and Digital Libraries, in Volume 68;
  • Atkinson, Malcolm - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54;
  • Attali, Isabelle - Alias Analysis for Exceptions in Java, in Volume 4;
  • Au, Fiora T. W. - Automated Usability Testing Framework, in Volume 76;
  • Au, Richard - A Method for Access Authorisation Through Delegation Networks, in Volume 54;
  • Ausanka-Crues, Ryan - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
  • Ausiello, Giorgio - Greedy algorithms for on-line set-covering and related problems, in Volume 51;
  • Avery, Benjamin - Evaluation of User Satisfaction and Learnability for Outdoor Augmented Reality Gaming, in Volume 50; - Outdoor Augmented Reality Gaming on Five Dollars a Day, in Volume 40;
  • Avram, Chris - Differing Ways that Computing Academics Understand Teaching, in Volume 66; - Performance and progression of first year ICT students, in Volume 78;
  • Awang Iskandar, D. N. F. - Content-based Image Retrieval Using Image Regions as Query Examples, in Volume 75;
  • Ayed, Samiha - Deploying Access Control in Distributed Workflow, in Volume 81;
  • Azok, Joseph - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
Top of List

B

  • Baader, Franz - A Description Logics Voyage: From Inexpressive to Expressive Languages and Back, in Volume 58;
  • Back, Ralph-Johan - Improving mathematics and programming education - the IMPEd initiative, in Volume 88;
  • Back, Ralph-Johan - Why Complicate Things? Introducing Programming in High School Using Python, in Volume 52;
  • Bae, Sang Won - Constructing Optimal Highways, in Volume 65;
  • Baeza-Yates, Ricardo - Web Mining in Search Engines, in Volume 26;
  • Bagirov, Adil M. - Modified Global K-Means Algorithm for Clustering in Gene Expression Data Sets, in Volume 73;
  • Bahreini, Kiavash - Enterprise Semantic Information Search System Based on New Music and Audio Ontology Integrating Existing Ontologies, in Volume 85;
  • Bai, Shi - On the Efficiency of Pollard's Rho Method for Discrete Logarithms, in Volume 77;
  • Bai, Xin - Segmentation-Based Multilayer Diagnosis Lossless Medical Image compression, in Volume 36;
  • Bailey, James - Are Zero-suppressed Binary Decision Diagrams Good for Mining Frequent Patterns in High Dimensional Datasets?, in Volume 70; - Merging Dynamic Functionality: Integration of XML Transformations, in Volume 67; - Static Analysis of XSLT Programs, in Volume 27; - Transformation and Reaction Rules for Data on the Web, in Volume 39;
  • Bain, Christopher A. - Hospital Management Knowledge Discovery using Discrete Event Simulation, in Volume 68;
  • Bain, Michael - Learning Causal Networks from Microarray Data, in Volume 73; - Learning from Ontological Annotation : an Application of Formal Concept Analysis to Feature Construction in the Gene Ontology, in Volume 85;
  • Bajic, Vladimir B. - From Informatics to Bioinformatics, in Volume 19;
  • Baker, Bob - A New Approach to a First Year Undergraduate Information Systems Course, in Volume 20; - Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52; - Predictors of success in a first programming course, in Volume 52; - The ability to articulate strategy as a predictor of programming skill, in Volume 52;
  • Baker, Simon - Automated Usability Testing Framework, in Volume 76;
  • Balasubramaniam, Dharini - Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
  • Balasubramaniam, Sasitharan - Quality of Service Support for Vertical Handovers in Pervasive Systems, in Volume 25;
  • Balbuena, Camino - An open problem: (4; g)-cages with odd g <= 5 are tightly connected, in Volume 65;
  • Ballinger, Daniel - Spreadsheet structure inspection using low level access and visualisation, in Volume 18; - Spreadsheet Visualisation to Improve End-user Understanding, in Volume 24;
  • Bancroft, Peter - A Web Based Environment for Learning to Program, in Volume 16; - Automated Feedback for 'Fill in the Gap' Programming Exercises, in Volume 42; - Managing Large Class Assessment, in Volume 30; - Multiple Choice Questions Not Considered Harmful, in Volume 42; - Program Annotations: Feedback for Students Learning to Program, in Volume 52; - Static Analysis of Students' Java Programs, in Volume 30;
  • Bao, Feng - Counterfeiting Attack on a Lossless Authentication Watermarking Scheme, in Volume 22;
  • Barbuto, Leah May - The Role of the Teacher in Scaffolding Children's Interactions in a Technological Environment: How a Technology Project is Transforming Preschool Teacher Practices in Urban Schools, in Volume 34;
  • Bard, Gregory V. - Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric, in Volume 68;
  • Barg, Michael - Cooperative Query Answering for Semistructured Data, in Volume 17;
  • Barker, Ken - Controlling Inference: Avoiding P-level Reduction during Analysis, in Volume 68;
  • Barker, Sandra - Online Discussion Boards: Impacting the Learning Experience, in Volume 20;
  • Barlow, Michael - A Comparative Study for Domain Ontology Guided Feature Extraction, in Volume 16;
  • Barnard, Ross - Let the Shoemaker Make the Shoes - An Abstraction Layer is Needed Between Bioinformatic Analysis, Tools, Data and Equipment : An Agenda for the Next Five Years, in Volume 19;
  • Barnes, Alan - Researching Pedagogy and Teaching Methodologies that Transform Student Learning in South Australian Classrooms, in Volume 8;
  • Barnes, David G. - A Portal for Grid-enabled Physics, in Volume 44;
  • Barnes, Ian - Redesigning the Intermediate Course in Software Design, in Volume 42;
  • Barney, David - Calculating Train Braking Distance, in Volume 3;
  • Barr, Pippin - A Taxonomic Analysis of User-Interface Metaphors in the Microsoft Office Project Gallery, in Volume 40; - From Pushing Buttons to Play and Progress: Value and Interaction in Fable, in Volume 50; - Icons R Icons, in Volume 18; - Persuasive Interaction for Collectivist Cultures, in Volume 50; - The Semiotics of User Interface Redesign, in Volume 40;
  • Barta, Robert - The Tau Model, Formalizing Topic Maps, in Volume 43; - Topic Maps: Fundamentalism meets Pragmatism, in Volume 58;
  • Bartlett, B. - Dogs or Robots - Why do Children See Them as Robotic Pets Rather Than Canine Machines?, in Volume 28;
  • Baskinger, Mark - Visual Narratives: The Essential Role of Imagination in the Visualization Process, in Volume 60;
  • Bate, Iain - A Contract-based Approach to Designing Safe Systems, in Volume 33;
  • Baturo, Annette R. - Integrating Concrete and Virtual Materials in an Elementary Mathematics Classroom: A Case Study of Success with Fractions, in Volume 8;
  • Bauer, Michael J. - Functional Safety of a Theatre Stage Machinery Control System, in Volume 15;
  • Baxter, Rohan - Predictive Model of Insolvency Risk for Australian Corporations, in Volume 70;
  • Bazilio, Carlos - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
  • Bean, R. W. - Clustering Replicated Microarray Data via Mixtures of Random Effects Models for Various Covariance Structures, in Volume 73;
  • Beauchamp, Gary - The Influence of a Technology-rich Classroom Environment on Elementary Teachers' Pedagogy and Children's Learning, in Volume 34;
  • Beck, Dominik - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
  • Becker, George - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
  • Beckett, Paul - Towards Nanocomputer Architecture, in Volume 6;
  • Bedford, Gail K. - 'Theyyur Aye Now Sand in Theur' Jake 4.11 Years - Transition and the Importance of the Learning Environment, in Volume 34; - The Gifts of Athena: Mindsets, Metaphors and Methods for 21st Century Learning, in Volume 34;
  • Bednarik, Roman - Con�ictive animations as engaging learning tools, in Volume 88;
  • Beecher, Bronwyn - Learning Technologies in Children's Social Contexts , in Volume 34;
  • Beeson, Brett - A Portal for Grid-enabled Physics, in Volume 44;
  • Beis, Mihalis - Large k-Separated Matchings of Random Regular Graphs, in Volume 38;
  • Bekos, Michael A. - Polygons Labelling of Minimum Leader Length, in Volume 60;
  • Beldiceanu, Nicolas - Dispensation Order Generation for Pyrosequencing, in Volume 29;
  • Bell, Genevieve - Just Like Magic: Anthropological Musings on the History and Culture of Wireless Technologies, in Volume 62;
  • Bell, Gordon - Realizing Memex... Digital Capture, Storage, and Utilization of All Personal Information, in Volume 82;
  • Bell, Graeme - Forward Chaining for Robot and Agent Navigation using Potential Fields, in Volume 26;
  • Bell, John - The Webworkforce - a learning repository to support educators, trainers and Information Technology courses, in Volume 20;
  • Bell, Ron - Introduction to IEC 61508, in Volume 55;
  • Bellgard, Matthew - Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources, in Volume 44;
  • Bem, Derek - Computer forensics workshop for undergraduate students, in Volume 78;
  • Bem, Ewa Z. - A Case for Teaching Computer Architecture, in Volume 20;
  • Benatallah, Boualem - A Collaborative Approach for Caching Dynamic Data in Portal Applications, in Volume 27; - A Framework for Managing the Evolution of Business Protocols in Web Services, in Volume 67; - A Petri Net-based Model for Web Service Composition, in Volume 17; - Dynamic Restructuring of Recovery Nets, in Volume 39; - Patterns for e-service composition, in Volume 13; - ServiceMosaic Project: Modeling, Analysis and Management of Web Services Interactions, in Volume 53;
  • Bennamoun, Mohammed - Determining Termhood for Learning Domain Ontologies in a Probabilistic Framework, in Volume 70; - Determining Termhood for Learning Domain Ontologies using Domain Prevalence and Tendency, in Volume 70; - Integrated Scoring For Spelling Error Correction, Abbreviation Expansion and Case Restoration in Dirty Text, in Volume 61;
  • Bennedsen, Jens - What does 'objects-first' mean? An international study of teachers' perceptions of objects-first, in Volume 88;
  • Bennett, Graham - A Comparative Study of Probabalistic and Language Models for Information Retrieval, in Volume 75;
  • Benwell, George L. - A Wavelet-Based Neuro-Fuzzy System for Data Mining Small Image Sets, in Volume 32;
  • Benzie, David - The Gifts of Athena: Mindsets, Metaphors and Methods for 21st Century Learning, in Volume 34;
  • Berbers, Yolande - A Tool for Component Based Design of Embedded Software, in Volume 10;
  • Berger, Helmut - An Adaptive Information Retrieval System Based on Associative Networks, in Volume 31; - Improving Domain Ontologies by Mining Semantics from Text, in Volume 31;
  • Bergin, Joe - A Comparison of Different Approaches to the Introductory Programming Course, in Volume 52;
  • Bergin, Susan - Automated Assessment in CS1, in Volume 52;
  • Berglund, Anders - A doctoral course in research methods in computing education research. How should we teach it?, in Volume 88; - Debating the OO debate: where is the problem?, in Volume 88; - Differing Ways that Computing Academics Understand Teaching, in Volume 66; - Five Myths of Assessment, in Volume 30; - How does internationalisation affect learning and teaching of computer science: a study at Tongji University in China, in Volume 88; - How Students Develop Concurrent Programs, in Volume 95; - Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78; - Qualitative Research Projects in Computing Education Research: An Overview, in Volume 52; - Students learn CS in different ways: insights from an empirical study, in Volume 78; - Students' understandings of concurrent programming, in Volume 88; - What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
  • Bergmann, Neil - Implementation of a Triple Modular Redundant FPGA based Safety Critical Systems for Reliable Software Execution, in Volume 69;
  • Berlich, Rudiger - Grid Computing in Europe: From Research to Deployment, in Volume 44;
  • Berlich, Ruediger - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54;
  • Bernstein, Yaniv - Distributed Text Retrieval From Overlapping Collections, in Volume 63;
  • Berretta, Regina - Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data, in Volume 38; - The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction, in Volume 38;
  • Berrigan, Rebecca - A Solar System Metaphor for 3D Visualisation of Object Oriented Software Metrics, in Volume 35;
  • Berry, Marsha - Mobile Computing, Programming, Games and Online Communities: Changes to the Communicative Ecology of Design Students Through Mobile Computing: Part 2, in Volume 66; - Mobile Computing, Visual Diaries, Learning and Communication: Changes to the Communicative Ecology of Design Students Through Mobile Computing, in Volume 52;
  • Berry, Rodney - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
  • Bertok, Peter - Pattern Categories: A Mathematical Approach for Organizing Design Patterns, in Volume 13;
  • Bevinakoppa, Savitri - A Dihedral Angle Database of Short Sub-sequences for Protein Structure Prediction, in Volume 29;
  • Beynon, Meurig - Contextualising information and communications technology in developing countries, in Volume 88;
  • Bezdek, James C. - Approximate Data Mining in Very Large Relational Data, in Volume 49;
  • Bhuvaneswaran, R.S. - Redundant Parallel Data Transfer Schemes for the Grid Environment, in Volume 54;
  • Biddle, Robert - A Case for Iconic Icons, in Volume 50; - A Case Study of Cartoon Visualisation Using AspectJ, in Volume 24; - A Lightweight Web-Based Case Tool for UML Class Diagrams, in Volume 18; - A Taxonomic Analysis of User-Interface Metaphors in the Microsoft Office Project Gallery, in Volume 40; - A Web User Interface For An Interactive Software Repository, in Volume 28; - Aspects to Visualising Reusable Components, in Volume 24; - Clicki: A Framework for Light-weight Web-based Visual Applications, in Volume 40; - Delegation Diagrams: Visual Support for the Development of Object-Oriented Designs, in Volume 28; - Essential Use Cases and Responsibility in Object-Oriented Development, in Volume 4; - Evaluating Scalable Vector Graphics for Use in Software Visualisation, in Volume 24; - From Pushing Buttons to Play and Progress: Value and Interaction in Fable, in Volume 50; - How (Not) To Help People Test Drive Code, in Volume 7; - Icons R Icons, in Volume 18; - InspectJ : Program Monitoring for Visualisation Using AspectJ, in Volume 16; - Less Extreme Programming, in Volume 30; - Metaphor and Metonymy in Object-Oriented Design Patterns, in Volume 4; - Patterns for Essential Use Case Bodies, in Volume 13; - Persuasive Interaction for Collectivist Cultures, in Volume 50; - Postmodern Prospects for Conceptual Modelling, in Volume 53; - Program Visualisation for Visual Programs, in Volume 7; - Reflections on CRC Cards and OO Design, in Volume 10; - Sokoban: A System Object Case Study, in Volume 10; - Spreadsheet structure inspection using low level access and visualisation, in Volume 18; - Spreadsheet Visualisation to Improve End-user Understanding, in Volume 24; - Teaching the Evaluation of Object-Oriented Designs, in Volume 20; - Using Software Visualisation to Enhance Online Component Markets, in Volume 35; - Visualising 1,051 Visual Programs Module Choice and Layout in the Nord Modular Patch Language, in Volume 9; - Visualising Reusable Software Over The Web, in Volume 9; - XML Database Support for Program Trace Visualisation, in Volume 35;
  • Bidwell, Nicola J. - Identifying Salient Learning Experiences: A Scenario-Based Method Enabling Industry-University Partnerships in IT, in Volume 20; - Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
  • Biham, Eli - A New Very Fast Stream Cipher : Tpy, in Volume 81;
  • Billard, Angela - Access Control Models and Security Labelling, in Volume 62;
  • Bille, Wesley - Conceptual Modeling for Virtual Reality, in Volume 83;
  • Billerbeck, Bodo - Questioning Query Expansion: An Examination of Behaviour and Parameters, in Volume 27;
  • Billhardt, Holger - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
  • Billinghurst, Mark - Interaction With Partially Transparent Hands And Objects, in Volume 40;
  • Billington, Jonathan - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12; - Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels, in Volume 26; - Creating an Internet Inter-ORB Protocol Service Specification, in Volume 12; - Modelling and Initial Analysis of Operational Planning Processes using Coloured Petri Nets, in Volume 12; - On Defining the Service Provided by TCP, in Volume 16; - Towards Formal Specification and Analysis of Avionics Mission Systems, in Volume 12; - Validating TCP Connection Management, in Volume 12;
  • Bindhammer, T. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
  • Binemann-Zdanowicz, Aleksander - Context-Aware Web Information Systems, in Volume 31;
  • Bird, Linda - UML and XML Schema, in Volume 5;
  • Biro, Jan C. - Recognition Sequences in the Restriction Endonucleases, in Volume 29;
  • Biro, Josephine M.K. - Recognition Sequences in the Restriction Endonucleases, in Volume 29;
  • Bishop, Pamela F. - Information and Communication Technology and School Leaders, in Volume 8;
  • Bittner, Sven - Pruning Subscriptions in Distributed Publish/Subscribe Systems, in Volume 48;
  • Blackburn, Terence - Enterprise-Enabled Ubiquitous Workspaces, in Volume 25;
  • Blackmore, Karen L. - Identifying risks for cross-disciplinary higher degree research students, in Volume 78;
  • Blackwell, Bruce - Oracle's Technology for Bioinformatics and Future Directions, in Volume 19;
  • Blazejewski, Adam - Application of Self-Organizing Maps to Clustering of High-Frequency Financial Data, in Volume 32;
  • Blazewicz, Jacek - On the complexity of the DNA Simplified Partial Digest Problem, in Volume 51;
  • Blinman, Scott - Program Comprehension: Investigating the Effects of Naming Style and Documentation, in Volume 40;
  • Boardman, Glenn - Structure Based Semantic Measurement for Information Filtering Agents, in Volume 85;
  • Bobadilla, Jesus - The Effect of Sparsity on Collaborative Filtering Metrics, in Volume 92;
  • Boden, Mikael - Comparing SVM Sequence Kernels: A Subcellular Localization Theme, in Volume 73; - Higher Order HMMs for Localization Prediction of Transmembrane Proteins, in Volume 73; - Multi-stage Redundancy Reduction: Effective Utilisation of Small Protein Datasets, in Volume 73;
  • Bogdanovych, Anton - From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
  • Bogeholz, Serge - A Case Study in Access Control Requirements for a Health Information System, in Volume 32;
  • Bogorny, Vania - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83;
  • Boier, Ioana - Analytics for Audit and Business Controls in Corporate Travel and Entertainment, in Volume 70;
  • Boissieux, Laurence - Interactive Mediated Reality, in Volume 40;
  • Bond, Trevor - Parents' and Students' Satisfaction with the Use of Information Technology in Government Schools in Queensland, Australia, in Volume 8;
  • Bondy, Julian - Mining for offender group detection and story of a police operation, in Volume 70;
  • Bordes, Nicole - 3D Visualisation of Tumours and Blood Vessels in Human Liver, in Volume 22; - Grid services for e-archaeology, in Volume 82; - High Resolution Scalable Displays: Manufacturing and Use, in Volume 35; - Semi-Automatic Feature Delineation In Medical Images, in Volume 35;
  • Bornat, Richard - Mental models, consistency and programming aptitude, in Volume 78;
  • Borschbach, M. - Analysing MEG-Data by a Combination of Different Neural Networks, in Volume 19;
  • Bottcher, Stefan - CSC: Supporting Queries on Compressed Cached XML, in Volume 92;
  • Bottino, Rosa Maria - ICT, National Policies, and Impact on Schools and Teachers' Development, in Volume 23;
  • Boughton, Clive - Beginning to Define a Body of Knowledge for Safety Practitioners, in Volume 15; - Executable/Translatable UML in Computing Education, in Volume 30;
  • Bouguettaya, Athman - Infrastructure for Ubiquitous Services, in Volume 75;
  • Boukottaya, A. - Automating XML document Transformations: A conceptual modelling based approach, in Volume 31;
  • Bourne, Philip - The Future of Bioinformatics, in Volume 29;
  • Bower, Karyn - Managing Large Class Assessment, in Volume 30;
  • Bower, Mat - Differing Ways that Computing Academics Understand Teaching, in Volume 66;
  • Bower, Matt - A Learning System Engineering Approach to Developing Online Courses, in Volume 52;
  • Bowers, Shawn - Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE, in Volume 31;
  • Bowes, Janine - The Emerging Repertoire Demanded of Teachers of the Future : Surviving the Transition, in Volume 23;
  • Box, Ilona - A citation analysis of the ACE2005 - 2007 proceedings, with reference to the June 2007 CORE conference and journal rankings, in Volume 78; - A Citation Analysis of the ACSC 2006-2008 Proceedings, with Reference to the CORE Conference and Journal Rankings, in Volume 91; - Assessing the Assessment: an Empirical Study of an Information Systems Development Subject, in Volume 20; - Differing Ways that Computing Academics Understand Teaching, in Volume 66; - Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52; - Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78; - Object-Oriented Analysis, Criterion-Referencing and Bloom, in Volume 30; - Predictors of success in a first programming course, in Volume 52; - VELNET (Virtual Environment for Learning Networking), in Volume 30;
  • Boyd, Colin - Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets, in Volume 62; - Defining Security Services for Electronic Tendering, in Volume 32; - Five Sealed-bid Auction Models, in Volume 21; - Formal Analysis of Secure Contracting Protocol for E-Tendering, in Volume 54; - ID-based One-pass Authenticated Key Establishment, in Volume 81; - Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework, in Volume 54; - Provably Secure Key Exchange: an Engineering Approach, in Volume 21; - Secure Key Issuing in ID-based Cryptography, in Volume 32; - SKMA - A Key Management Architecture for SCADA Systems, in Volume 54; - Strong Designated Verifier Signature in a Multi-user Setting, in Volume 98;
  • Boyens, Claus - Privacy Conflicts in CRM Services for Online Shops: A Case Study, in Volume 14;
  • Boykiw, Alan - Successful Studio-based Real-World Projects in IT Education, in Volume 20;
  • Boyle, Martin - Formal and Informal Environments for the Learning and Teaching of Computer Programming, in Volume 23;
  • Boyle, Michael - Display and Presence Disparity in Mixed Presence Groupware, in Volume 28;
  • Brabrand, Claus - Constructive alignment and the SOLO taxonomy: a comparative study of university competences in computer science vs. mathematics, in Volume 88;
  • Bradley, Daniel - Belief Based Risk Analysis, in Volume 32; - Mesmerize - an Open Framework for Enterprise Security Management, in Volume 32;
  • Brady, Sarah - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
  • Brandl, Miriam - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
  • Brankovic, Ljiljana - A Framework for Privacy Preserving Data Mining, in Volume 32;
  • Brass, Peter - Constructing Optimal Highways, in Volume 65;
  • Brent, Richard P. - On the Efficiency of Pollard's Rho Method for Discrete Logarithms, in Volume 77;
  • Brereton, Margot - Ambient Interaction Framework - Software Infrastructure for the Rapid Development of Pervasive Computing Environments, in Volume 25; - Talking about watching: Using the Video Card Game and wiki-web technology to engage IT students in developing observational skills, in Volume 20; - Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
  • Breton, Vincent - Evaluation of Unique Sequences on the European Data Grid, in Volume 19;
  • Brewster, Stephen - Tactons: Structured Tactile Messages for Non-Visual Information Display, in Volume 28;
  • Bright, Damien - Enterprise-Enabled Ubiquitous Workspaces, in Volume 25;
  • Bringay, Sandra - S2MP: Similarity Measure for Sequential Patterns, in Volume 87;
  • Britton, Carol - UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
  • Brobst, Stephen - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
  • Brock, Michael - State Aware WSDL, in Volume 82;
  • Brodie-Tyrrell, William - Garbage Collection for Storage-Oriented Clusters, in Volume 26;
  • Brook, Phillip W - Conversational KM - Student Driven Learning, in Volume 30;
  • Brookes, Wayne - Computing Theory With Relevance, in Volume 30; - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
  • Broughton, Michael - Virtual Planning Rooms (ViPR): A 3D Visualisation Environment for Hierarchical Information, in Volume 50;
  • Brown, A.L. - Constructing Genome Scale Suffix Trees, in Volume 29;
  • Brown, Chris M. - Signals in mRNAs that Influence the Initiation of Translation, in Volume 19;
  • Brown, Curtis - Implementation and Indeterminacy, in Volume 37;
  • Brown, Lorna M. - Tactons: Structured Tactile Messages for Non-Visual Information Display, in Volume 28;
  • Brumen, Bostjan - Early Assessment of Classification Performance, in Volume 32;
  • Brunton, Emma - Characterizing Image Properties for Digital Mammograms, in Volume 97;
  • Brusa, Graciela - A Process for Building a Domain Ontology: an Experience in Developing a Government Budgetary Ontology, in Volume 72;
  • Brusic, Vladimir - From Informatics to Bioinformatics, in Volume 19;
  • Bruza, Peter - Combining Structure and Content Similarities for XML Document Clustering, in Volume 87; - Dimensionality Reduction in Patch-Signature Based Protein Structure Matching, in Volume 49;
  • Bryant, Darryn - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
  • Bryant, Kay C. - A Methodology for the Design of Courses in Information Systems, in Volume 20; - The Evaluation of Courses in Information Systems, in Volume 30;
  • Buang, Norazwin - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
  • Bubendorfer, Kris - A JMX Toolkit for Merging Network Management Systems, in Volume 48; - A RMI Protocol for Aglets, in Volume 26; - Auction Based Resource Negotiation in NOMAD, in Volume 38; - Grid Resource Allocation : Allocation Mechanisms and Utilisation Patterns, in Volume 82; - Improving Resource Utilisation in Market Oriented Grid Management and Scheduling, in Volume 54;
  • Buchanan, George - The Challenge of Creating Cooperating Mobile Services: Experiences and Lessons Learned, in Volume 48;
  • Buchmann, Volkert - Interaction With Partially Transparent Hands And Objects, in Volume 40;
  • Buckle, Ashley - Impact of Grid Computing in Structural Biology, in Volume 99;
  • Buckler, Ed - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29;
  • Budd, Daryl - Visualization of Travel Itinerary Information on PDAs, in Volume 28;
  • Budd, Peter - An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology, in Volume 68;
  • Bui, Michael - Visualization of a Closed Three-Dimensional Surface using Portal-based Rendering, in Volume 60;
  • Bulka, Andy - Design Pattern Automation, in Volume 13;
  • Bullers, William I. Jr. - Personal Software Process in the Database Course, in Volume 30;
  • Bundell, Gary A. - Determining Component Reliability Using a Testing Index, in Volume 4;
  • Bunder, Martin - The Inhabitation Problem for Intersection Types, in Volume 77;
  • Burgess, Scott A. - Steve Austin Versus the Symbol Grounding Problem, in Volume 37;
  • Burmeister, Jay - Extending and Evaluating a Pattern Language for Safety-Critical User Interfaces, in Volume 3; - Successful Studio-based Real-World Projects in IT Education, in Volume 20;
  • Burmeister, Oliver K. - HCI Professionalism: Ethical Concerns in Usability Engineering, in Volume 1; - Usability Testing: Revisiting Informed Consent Procedures for Testing Internet Sites, in Volume 1;
  • Burnett, Mark - Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom, in Volume 21;
  • Burton, Benjamin A. - Informatics Olympiads: Challenges in Programming and Algorithm Design, in Volume 74;
  • Busch, Peter A. - Graphically Defining Articulable Tacit Knowledge, in Volume 2; - Selected Tacit Knowledge Observations Within Two Organisations, in Volume 22; - The graphical interpretation of plausible tacit knowledge flows, in Volume 24; - Visual Mapping of Articulable Tacit Knowledge, in Volume 9;
  • Butavicius, Marcus A. - An Empirical Evaluation of Chernoff Faces, Star Glyphs, and Spatial Visualisations for Binary Data, in Volume 24;
  • Butler, Greg - Refactoring Use Case Models : The Metamodel, in Volume 16;
  • Buttfield, Anna - A New Approach to Rapid Image Morphing for Lip Motion Synthesis, in Volume 16;
  • Butts, Lee - An Evaluation of Mobile Phone Text Input Methods, in Volume 7;
  • Buur, Jacob - Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
  • Buys, Laurie - Data Mining in Conceptualising Active Ageing, in Volume 61;
  • Buyya, Rajkumar - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44; - A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68; - Scheduling Parallel Applications on Utility Grids: Time and Cost Trade-off Management, in Volume 91;
  • Bykova, Marina - Remote Revocation of Smart Cards in a Private DRM System, in Volume 44;
  • Byrne-Armstrong, Hilary - Corporate Voices, Personal Voices: The Ethics of the Internet, in Volume 1;
Top of List

C

  • Caballero-Gil, Pino - Current Topics in Security of Mobile Ad-hoc NETworks, in Volume 81; - Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences, in Volume 81;
  • Caelli, Terry - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
  • Caelli, William - Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98; - Open Trusted Health Informatics Structure (OTHIS), in Volume 80; - Privacy and Security in Open and Trusted Health Information Systems, in Volume 97; - Securing Grid Data Using Mandatory Access Controls, in Volume 68;
  • Caelli, William J. - DRM, Trusted Computing and Operating System Architecture, in Volume 44; - Using Self-Defending Objects to Develop Security Aware Applications in Java, in Volume 26; - Visually Sealed and Digitally Signed Documents, in Volume 26;
  • Cafezeiro, Isabel - Semantic Interoperability via Category Theory, in Volume 83;
  • Cai, Tom Weidong - A 3D Image Smoothing Method for Dynamic Functional Imaging, in Volume 2; - A Solution to the Distribution and Standarization of Multimedia Medical Data in E-Health, in Volume 11; - A Web Based Medical Image Data Processing and Management System, in Volume 2; - A Web-based Collaborative System for Medical Image Analysis and Diagnosis, in Volume 2; - Automatic Detection of PET Lesions, in Volume 22; - Integrated Multimedia Medical Data Agent in E-Health, in Volume 11;
  • Cajander, Asa - Evolution of an International Collaborative Student Project, in Volume 95;
  • Calder, Paul - A Pattern Language for Pattern Language Structure, in Volume 13; - A Pattern-Based Problem-Solving Process for Novice Programmers, in Volume 20; - Applying Patterns to Novice Programming Problems, in Volume 13; - Multi-Perspective Images for Visualisation, in Volume 11; - Patterns in Learning to Program - An Experiment?, in Volume 30; - Rendering Multi-Perspective Images with Trilinear Projection, in Volume 48; - Visualising Phylogenetic Trees, in Volume 50;
  • Caldon, Patrick - Using Text Classification to Predict the Gene Knockout Behaviour of S. Cerevisiae, in Volume 19;
  • Caliusco, Maria Laura - A Process for Building a Domain Ontology: an Experience in Developing a Government Budgetary Ontology, in Volume 72;
  • Calvert, Sandra L. - Production Features for Intrinsically Interesting Learning Environments, in Volume 34;
  • Calvo, Rafael A. - Classification of Brain-Computer Interface Data, in Volume 87;
  • Cameron, David - Storage and Data Management in EGEE, in Volume 68;
  • Campbell, Brett - Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
  • Cannane, Adam - Access-Ordered Indexes, in Volume 26; - Indexing for Fast Categorisation, in Volume 16;
  • Cannings, Terence - Bridging the Gap Between Theory and Practice in Preservice Education : The Use of Video Case Studies, in Volume 23; - Online Constructionism and the Future of Teacher Education, in Volume 23;
  • Cant, Tony - A Lightweight Approach to Formal Safety Architecture Assurance: The PARTI Case Study, in Volume 100; - Computer-Based Safety Critical Systems in Defence: Def (Aust) 5679, in Volume 15; - Guidance for Def (Aust) 5679 Issue 2, in Volume 100; - Hierarchical Verification Environment, in Volume 55; - Revision of Australian Defence Standard Def (Aust) 5679, in Volume 55;
  • Cao, Jing - Formal Model of a Protocol Converter, in Volume 94;
  • Cao, Jinli - A Flexible Payment Scheme and its Permission-Role Assignment, in Volume 16; - Anonymous Access Scheme for Electronic Services, in Volume 26; - Authorization Algorithms for the Mobility of User-Role Relationship, in Volume 38; - Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations, in Volume 17; - Ticket-Based Service Access Scheme for Mobile Users, in Volume 4;
  • Cao, Longbing - Discovering Debtor Patterns of Centrelink Customers, in Volume 61; - The Fish-eye Visualization of Foreign Currency Exchange Data Streams, in Volume 45;
  • Cao, Shuping - Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
  • Cao, Tri M. - A Simulation Framework for Knowledge Acquisition Evaluation, in Volume 38;
  • Carbone, Angela - A Studio-Based Approach to Teaching Information Technology, in Volume 8; - An Exploration of Internal Factors Influencing Student Learning of Programming, in Volume 95; - Determination of Factors which Impact on IT Students' Propensity to Cheat, in Volume 20; - From Informal to Formal: Creating the Australasian Computing Education Community, in Volume 30; - ICT teaching and learning in a new educational paradigm: lecturers' perceptions versus students' experiences, in Volume 88; - Performance and progression of first year ICT students, in Volume 78; - The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
  • Carlsen, Roger - Using an Educational Census to Reach Educational Technology Tipping Point, in Volume 23;
  • Carlsson, Mats - Dispensation Order Generation for Pyrosequencing, in Volume 29;
  • Caromel, Denis - Alias Analysis for Exceptions in Java, in Volume 4;
  • Carreira, Joao - Nuisance Free Recognition of Hand Postures Over a Tabletop Display, in Volume 56;
  • Carrington, David - An Approach to Specifying Software Frameworks, in Volume 26; - Cross-Layer Verification of Type Flaw Attacks on Security Protocols, in Volume 62; - Graph Drawing Aesthetics and the Comprehension of UML Class Diagrams: An Empirical Study, in Volume 9; - UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
  • Carrizo, Savrina F. - A Colour-Filling Approach For Visualising Trait Evolution With Phylogenies, in Volume 35; - Phylogenetic Trees: An Information Visualisation Perspective, in Volume 29;
  • Carter, Belinda M. - Customizing Internal Activity Behaviour for Flexible Process Enforcement, in Volume 27;
  • Carter, Gary - Faster Group Operations on Elliptic Curves, in Volume 98;
  • Carter, Simon - Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models, in Volume 16;
  • Casas, Josep R. - Image-Based Multi-view Scene Analysis using 'Conexels', in Volume 56;
  • Casati, Fabio - A Framework for Managing the Evolution of Business Protocols in Web Services, in Volume 67;
  • Caseley, Paul - Measuring Safety: Applying PSM to the System Safety Domain, in Volume 33;
  • Casey, Des - Performance and progression of first year ICT students, in Volume 78;
  • Cassidy, Steve - DASMAS - Dialogue based Automation of Semantic interoperability in Multi Agent Systems, in Volume 58;
  • Catchpoole, Daniel R. - Comparison of Visualization Methods of Genome-wide SNP Profiles in Childhood Acute Lymphoblastic Leukaemia, in Volume 87; - Kernel-based Visualisation of Genes with the Gene Ontology, in Volume 87;
  • Ceddia, Jason - Automating the Estimation of Project Size from Software Design Tools Using Modified Function Points, in Volume 30; - WAT - A Tool for Classifying Learning Activities from a Log File, in Volume 66;
  • Ceglar, Aaron - CURIO: A Fast Outlier and Outlier Cluster Detection Algorithm for Large Datasets, in Volume 84; - Discovering Itemset Interactions, in Volume 91; - Towards Active Conceptual Modelling for Sudden Events, in Volume 83;
  • Cerecke, Carl - Repairing Syntax Errors in LR-based Parsers, in Volume 4;
  • Cerone, Antonio - From Process Algebra to Visual Language, in Volume 12; - Representing ASN.1 in Z, in Volume 21;
  • Chadha, Urvashi - Incorporating Business Requirements and Constraints in Database Conceptual Model, in Volume 31;
  • Chakka, Nagesh - Pathway to Functional Studies: Pipeline Linking Phylogenetic Footprinting and Transcription-Factor Binding Analysis, in Volume 73;
  • Chambers, Dianne - Selecting the Right Technology for Students in a Changing Teaching Environment : A Case Study, in Volume 23;
  • Chambers, Les - A Hazard Analysis of Human Factors in Safety-critical Systems Engineering, in Volume 55;
  • Chamiel, Gil - Utilising Ontological Structure for Reasoning with Preferences, in Volume 90;
  • Chan, Celyn S L - A System for Geographical and Spatial Data Exploration on the Internet, in Volume 2;
  • Chan, Chee Y. - Building Trust in Third-party Components using Component Wrappers in the .NET Frameworks, in Volume 10;
  • Chan, Darin - Context-Sensitive Mobile Database Summarisation, in Volume 16;
  • Chan, Stephen - Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries, in Volume 63;
  • Chan, Stephen C.F. - Using Emerging Pattern Based Projected Clustering and Gene Expression Data for Cancer Detection, in Volume 29;
  • Chan, Tony K Y - A System for Geographical and Spatial Data Exploration on the Internet, in Volume 2;
  • Chan, Yau Lin - Web-based Multimedia Collaboration System for Medical Images Analysis and Diagnosis, in Volume 22;
  • Chandra, Andrias - Video Cataloguing and Browsing, in Volume 11;
  • Chang, Ching-Lueh - Spreading of Messages in Random Graphs, in Volume 94; - Testing Embeddability Between Metric Spaces, in Volume 77;
  • Chang, Dempsey - Developing Gestalt-based Design Guidelines for Multi-sensory Displays, in Volume 57; - Gestalt Theory in Visual Screen Design - A New Look at an Old Subject, in Volume 8; - The Gestalt Principles of Similarity and Proximity Apply to Both the Haptic and Visual Grouping of Elements, in Volume 64;
  • Chang, Elizabeth - Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling, in Volume 79;
  • Chang, Hans - Displaying Linear Programs and Their Solutions With XML and SVG, in Volume 35;
  • Chang, Hsuan T. - Visualisation and Comparison of DNA Sequences by Use of Three-Dimensional Trajectories, in Volume 19;
  • Chang, Margaret Dah-Tsyr - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
  • Chang, S. - On the Simultaneous Use of Clinical and Microarray Expression Data in the Cluster Analysis of Tissue Samples, in Volume 29;
  • Chang, Tao-Ku - A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery, in Volume 63;
  • Chang, Wei-Yuan - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
  • Chang, Yan - A Hierarchical Approach in Multilevel Thresholding Based on Maximum Entropy and Bayes' Formula, in Volume 11; - An Effective Multilevel Thresholding Approach Using Conditional Probability Entropy and Genetic Algorithm, in Volume 22; - Comparison of Five Conditional Probabilities in 2-Level Image Threshold Based on Bayesian Formulation, in Volume 2;
  • Chang, Yen-Jen - Sentry Tag: An Efficient Filter Scheme for Low Power Cache, in Volume 6;
  • Chapman, Roderick - Correctness by Construction: a Manifesto for High Integrity Software, in Volume 55;
  • Charlton, Philip - A Discriminant Analysis for Undersampled Data, in Volume 84;
  • Chattaraj, Abhijit - Variable-length Intervals in Homology Search, in Volume 29;
  • Chau, Rowena - A ConceptLink Graph for Text Structure Mining, in Volume 91; - Discovering Parallel Text from The World Wide Web, in Volume 32;
  • Chauchat, Jean-Hughes - Accuracy Estimation With Clustered Dataset, in Volume 61;
  • Chawla, Ashish - A High Performance Kernel-Less Operating System Architecture, in Volume 38;
  • Chawner, Brenda - Usability Evaluation of Library Online Catalogues, in Volume 50;
  • Chee, Clinton - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
  • Cheeseman, Paul - Are We Making Progress?, in Volume 100;
  • Chen, Danny - Optimizing The Lazy DFA Approach for XML Stream Processing, in Volume 27;
  • Chen, Ding-Yi - Determining the Fitness of a Document Model by Using Conflict Instances, in Volume 39;
  • Chen, Dingyi - Ranking-Constrained Keyword Sequence Extraction from Web Documents, in Volume 92;
  • Chen, Fang - Exploratory Study of Lexical Patterns in Multimodal Cues, in Volume 57; - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57; - QuickFusion: Multimodal Fusion Without Time Thresholds, in Volume 57;
  • Chen, Gen-Huey - Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network, in Volume 6;
  • Chen, Guocai - Automatically Generated Consumer Health Metadata Using Semantic Spaces, in Volume 80;
  • Chen, Hanxiong - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
  • Chen, Hsin-Ming - Analysis of Hardware and Software Approaches to Embedded In-Circuit Emulation of Microprocessors, in Volume 6;
  • Chen, Huiling - Classification Comparison of Prediction of Solvent Accessibility From Protein Sequences, in Volume 29;
  • Chen, Jason - Useful Clustering Outcomes from Meaningful Time Series Clustering, in Volume 70;
  • Chen, Jianfeng - Wearable Microphone Array as User Interface, in Volume 28;
  • Chen, Jie - A Delivery Framework for Health Data Mining and Analytics, in Volume 38; - Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
  • Chen, Jinjun - A Min-Min Average Algorithm for Scheduling Transaction-Intensive Grid Workflows, in Volume 99; - Key Research Issues in Grid Workflow Verification and Validation, in Volume 54;
  • Chen, Jisong - Discovering Parallel Text from The World Wide Web, in Volume 32;
  • Chen, Liang-Hua - An Integrated Approach to Video Retrieval, in Volume 75;
  • Chen, Lin - A Case Study of Failure Mode Analysis with Text Mining Methods, in Volume 84;
  • Chen, Shiping - Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
  • Chen, Weidong - Aggregate Predicate Support in DBMS, in Volume 5;
  • Chen, Xia - Determining the Fitness of a Document Model by Using Conflict Instances, in Volume 39; - Ranking-Constrained Keyword Sequence Extraction from Web Documents, in Volume 92;
  • Chen, Xing - A Semantic Associative Computation Method for Automatic Decorative-Multimedia Creation with 'Kansei' Information, in Volume 96;
  • Chen, Yi-Ping Phoebe - A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights, in Volume 38; - Extensible Detection and Indexing of Highlight Events in Broadcasted Sports Video, in Volume 48;
  • Chen, Zhe - A Telemedicine System over Internet, in Volume 2; - Automatic Detection of PET Lesions, in Volume 22;
  • Cheng, Jingzhi - A Combined Model and a Varied Gibbs Sampling Algorithm Used for Motif Discovery, in Volume 29;
  • Cheng, Kelvin - Direct Interaction with Large-Scale Display Systems using Infrared Laser tracking Devices, in Volume 24; - Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction, in Volume 38;
  • Cheon, Suh Hyun - Visualization by information type on mobile device, in Volume 60;
  • Cheong, Otfried - Computing a Minimum-Dilation Spanning Tree is NP-hard, in Volume 65; - Constructing Optimal Highways, in Volume 65;
  • Cheow, Peng Yew - Representing and Reasoning on XForms Document, in Volume 27;
  • Cherfi, Samira Si-said - Perceived vs. Measured Quality of Conceptual Schemas: An Experimental Comparison, in Volume 83;
  • Cherif, Amar R. - A Framework Based Measurements for Evaluating an IS Quality, in Volume 79;
  • Chesnevar, Carlos Ivan - An Argumentative Approach to Reasoning with Inconsistent Ontologies, in Volume 90;
  • Chetty, Girija - Audio-Visual Multimodal Fusion for Biometric Person Authentication and Liveness Verification, in Volume 57; - Video to the Rescue, in Volume 56;
  • Cheung, Kingsley - A Resource Management Framework for Priority-Based Physical-Memory Allocation, in Volume 6;
  • Cheung, Sherman - A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68;
  • Cheung, William K. - Mobile Information Exchange and Integration: From Query to Application Layer, in Volume 92;
  • Cheung, Y.T. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
  • Chi, Xuebin - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
  • Chicharo, Joe - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
  • Chik, Desmond - Using Optical Flow for Step Size Initialisation in Hand Tracking by Stochastic Optimisation, in Volume 56;
  • Chilcott, P. - An Evaluation of Web Services in the Design of a B2B Application, in Volume 26;
  • Chin, Kuo-Hao - An Integrated Approach to Video Retrieval, in Volume 75;
  • Chinneck, Paul - The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation, in Volume 47;
  • Chiotti, Omar - A Process for Building a Domain Ontology: an Experience in Developing a Government Budgetary Ontology, in Volume 72;
  • Chiu, Bill - We Have Seen the Future, and It Is Symbolic, in Volume 32;
  • Chiu, ChiHuang - Aggregate Predicate Support in DBMS, in Volume 5;
  • Chiu, Kenneth - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
  • Chiu, Wah - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
  • Chivers, William J. - A Grid Resource Allocation Mechanism for Heterogeneous E-waste Computers, in Volume 99;
  • Cho, Andrew - JWS: A Flexible Web Service, in Volume 74;
  • Cho, Joo Yeon - Formal Analysis of Card-based Payment Systems in Mobile devices, in Volume 54;
  • Cho, Sung-Bae - Machine Learning in DNA Microarray Analysis for Cancer Classification, in Volume 19;
  • Choi, Eric - Exploratory Study of Lexical Patterns in Multimodal Cues, in Volume 57; - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
  • Choi, Eric H.C. - On Compensating the Mel-Frequency Cepstral Coefficients for Noisy Speech Recognition, in Volume 48;
  • Choi, Jong Pill - wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability, in Volume 87;
  • Choi, Kelvin - Dynamic Measurement of Polymorphism, in Volume 62;
  • Choi, Ryan H. - Efficient XQuery Join Processing in Publish/Subscribe Systems, in Volume 92;
  • Chong, C.F. - Tuning the Collision Test for Power, in Volume 26;
  • Chong, Suan Khai - On pedagogically sound examples in public-key cryptography, in Volume 48;
  • Chong, Wen Haw - On Inconsistencies in Quantifying Strength of Community Structures, in Volume 87;
  • Choo, Kim-Kwang Raymond - Formal Analysis of Secure Contracting Protocol for E-Tendering, in Volume 54;
  • Chou, Pauline LienHua - Efficiently Computing the Top N Averages in Iceberg Cubes, in Volume 16;
  • Chow, K.P. - Tuning the Collision Test for Power, in Volume 26;
  • Chow, Yang-Wai - Human Visual Perception of Region Warping Distortions, in Volume 48; - Large Object Segmentation with Region Priority Rendering, in Volume 38;
  • Christen, Peter - A Two-Step Classification Approach to Unsupervised Record Linkage, in Volume 70; - Evaluation of a Graduate Level Data Mining Course with Industry Participants, in Volume 70; - Exploratory Multilevel Hot Spot Analysis: Australian Taxation Office Case Study, in Volume 70; - Febrl - A Freely Available Record Linkage System with a Graphical User Interface, in Volume 80; - Towards Automated Record Linkage, in Volume 61; - Towards Scalable Real-Time Entity Resolution using a Similarity-Aware Inverted Index Approach, in Volume 87;
  • Chu, Jia-Han - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
  • Chu, Wanming - Metacube - A New Interconnection Network for Large Scale Parallel Systems, in Volume 6;
  • Chu, Xingchen - A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68;
  • Chun, Jonghun - Automated Data Warehousing for Rule-based CRM Systems, in Volume 17;
  • Chung, A.L.S. - Teacher Empowerment and Minimalist Design, in Volume 23;
  • Chung, Fu-lai - Using Emerging Pattern Based Projected Clustering and Gene Expression Data for Cancer Detection, in Volume 29;
  • Chung, Jaewoo - AreWeThereYet? - A Temporally Aware Media Player, in Volume 76;
  • Chung, Vera - QuickFusion: Multimodal Fusion Without Time Thresholds, in Volume 57;
  • Chung, Voon-Li - The Development of a Distributed Capability System for VLOS, in Volume 6; - Towards Customisable Tuple Field Matching in VLOS, in Volume 16;
  • Church, W. Bret - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19; - Informative 3D Visualization of Multiple Protein Structures, in Volume 29;
  • Churcher, Clare - An Interactive Visualisation for Investigating DNA Sequence Information, in Volume 35; - An Interactive Visualisation for Selecting PCR Primers, in Volume 45;
  • Churcher, Neville - Building Virtual Worlds with the Big-Bang Model, in Volume 9; - Constructing Real-Time Collaborative Software Engineering Tools Using CAISE, an Architecture for Supporting Tool Development, in Volume 48; - Displaying Linear Programs and Their Solutions With XML and SVG, in Volume 35; - Informing the Design of Pipeline-Based Software Visualisations, in Volume 45; - Inhomogeneous Force-Directed Layout Algorithms in the Visualisation Pipeline: From Layouts to Visualisations, in Volume 35; - Modelling and Measuring Collaborative Software Engineering, in Volume 38; - Visualising Class Cohesion with Virtual Worlds, in Volume 24; - XML in the Visualisation Pipeline, in Volume 11;
  • Ciavarella, Michael - Lossless Image Compression Using Pixel Reordering, in Volume 26;
  • Ciesielski, Vic - Automatic Music Classification Problems, in Volume 26;
  • Cikara, S. - Modelling Layer 2 and Layer 3 Device Bandwidths using B-Node Theory, in Volume 48;
  • Cios, Krzysztof J. - Structure-Based Document Model with Discrete Wavelet Transforms and Its Application to Document Classification, in Volume 87;
  • Citro, Sandy - Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures, in Volume 62;
  • Clark, Andrew - Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks, in Volume 54; - Synapse: Auto-correlation and Dynamic Attack Redirection in an Immunologically-inspired IDS, in Volume 54;
  • Clark, Graham - Measuring Safety: Applying PSM to the System Safety Domain, in Volume 33;
  • Clark, Nicole - Evaluating Student Teams Developing Unique Industry Projects, in Volume 42; - Peer Testing in Software Engineering Projects, in Volume 30; - Self and Peer Assessment in Software Engineering Projects, in Volume 42;
  • Clark, Ted - Disadvantages of Collaborative Online Discussion and the Advantages of Sociability, Fun and Cliques for Online Learning, in Volume 23;
  • Clarke, Bill - Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU, in Volume 62; - Implemention Aspects of a SPARC V9 Complete Machine Simulator, in Volume 4;
  • Clarke, Brett - Corporate Curricula in Schools: Issues and Implementation, in Volume 8;
  • Clarke, Peter J. - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
  • Clarke, Sally - Developing Case Studies to Enhance Student Learning, in Volume 42;
  • Clear, Tony - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52; - Motivational Patterns in Virtual Team Collaboration, in Volume 42; - Surely We Must Learn to Read before We Learn to Write!, in Volume 95; - The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78; - Using SoDIS as a Risk Analysis Process: A Teaching Perspective, in Volume 30;
  • Clement, Christopher - An Experimental Study on Algorithms for Drawing Binary Trees, in Volume 60;
  • Clifton, Chris - Preface: Proceedings of the ICDM 2002 Workshop on Privacy, Security and Data Mining, in Volume 14;
  • Cloete, Ian - Neural Networks and Financial Trading and the Efficient Markets Hypothesis, in Volume 4;
  • Close, Benjamin S. - TIDL: Mixed Presence Groupware Support for Legacy and Custom Applications, in Volume 50;
  • Cochran, Duncan A. E. - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
  • Cockburn, Andy - Aiding Text Entry of Foreign Alphabets with Visual Keyboard Plus, in Volume 40; - An Evaluation of Mobile Phone Text Input Methods, in Volume 7; - Evaluating Swiftpoint as a Mobile Device for Direct Manipulation Input, in Volume 64; - Evaluation of Two Textual Programming Notations for Children, in Volume 40; - Get a Way Back : Evaluating Retrieval from History Lists, in Volume 18; - Program Comprehension: Investigating the Effects of Naming Style and Documentation, in Volume 40; - Rapid Visual Flow: How Fast Is Too Fast?, in Volume 28; - Revisiting 2D vs 3D Implications on Spatial Memory, in Volume 28; - The Design and Evaluation of a Flick Gesture for 'Back' and 'Forward' in Web Browsers, in Volume 18; - The Effects of Menu Parallelism on Visual Search and Selection, in Volume 76;
  • Coddington, Paul - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68; - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
  • Coddington, Paul D. - Communication Performance Issues for Two Cluster Computers, in Volume 16; - Extensible Job Managers for Grid Computing, in Volume 16;
  • Coddington, Paul D. - A Simplified Approach to Web Service Development, in Volume 54;
  • Coggins, Richard - Application of Self-Organizing Maps to Clustering of High-Frequency Financial Data, in Volume 32;
  • Cohen, Jeremy - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
  • Colbert, Bernard - The Symmetry Ratio of a Network, in Volume 41;
  • Colbert, Bernard D. - Network Robustness and Graph Topology, in Volume 26;
  • Coldwell, Jo - It is possible to teach computer ethics via distance education!, in Volume 1;
  • Cole, Linda - An Experimental Evaluation of Property Precedence in Conceptual Modelling, in Volume 31;
  • Coleman, Tom - On The Complexity of Manipulating Elections, in Volume 65;
  • Collberg, Christian - A Functional Taxonomy for Software Watermarking, in Volume 4;
  • Colnet, Dominique - Lisaac: the power of simplicity at work for operating system, in Volume 10;
  • Colomb, Robert - Process Modelling: The Deontic Way, in Volume 53;
  • Colomb, Robert M. - Managing Ontologies: A Comparative Study of Ontology Servers, in Volume 63; - Using Ontologies to Index Conceptual Structures for Tendering Automation, in Volume 5;
  • Colpoys, Linda - Graph Drawing Aesthetics and the Comprehension of UML Class Diagrams: An Empirical Study, in Volume 9; - UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
  • Colton, Don - Simple Eight Bit, Emulated Computers for Illustrating Computer Architecture Concepts and Providing a Starting Point for Student Designs, in Volume 66;
  • Colvin, R. - Translating Refined Logic Programs to Mercury, in Volume 4;
  • Compton, Michael - Stenning's Protocol Implemented in UDP and Verified in Isabelle, in Volume 41; - What is Required in Business Collaboration?, in Volume 92;
  • Compton, Paul - A Simulation Framework for Knowledge Acquisition Evaluation, in Volume 38;
  • Comyn-Wattiau, Isabelle - Perceived vs. Measured Quality of Conceptual Schemas: An Experimental Comparison, in Volume 83;
  • Conmy, Philippa - High Level Failure Analysis for Integrated Modular Avionics, in Volume 3; - Safety Assurance Contracts for Integrated Modular Avionics, in Volume 33;
  • Connelly, Simon - Extending and Evaluating a Pattern Language for Safety-Critical User Interfaces, in Volume 3; - Modelling Erroneous Operator Behaviours for an Air-Traffic Control Task, in Volume 7;
  • Conrad, Stefan - Relational.OWL - A Data and Schema Representation Format Based on OWL, in Volume 43;
  • Cook, Carl - Constructing Real-Time Collaborative Software Engineering Tools Using CAISE, an Architecture for Supporting Tool Development, in Volume 48; - Inhomogeneous Force-Directed Layout Algorithms in the Visualisation Pipeline: From Layouts to Visualisations, in Volume 35; - Modelling and Measuring Collaborative Software Engineering, in Volume 38;
  • Cook, Deirdre - 'Schoolish Things' or Playful Practices? ICT Use and Teachers' Views, in Volume 34; - The Question is No Longer 'If', but 'How Best', ICT can be Used in Early Years Practice, in Volume 34;
  • Cook, Duncan - Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists, in Volume 54;
  • Cooney, Dominic - A Programming Language for Web Service Development, in Volume 38;
  • Cooper, Brenton - Translation of Rights Expressions, in Volume 44;
  • Cooper, David - Java Implementation Verification Using Reverse Engineering, in Volume 26; - The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
  • Cooper, James - Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides, in Volume 62;
  • Cooper, Tom J. - Integrating Concrete and Virtual Materials in an Elementary Mathematics Classroom: A Case Study of Success with Fractions, in Volume 8;
  • Cope, Chris - Differing Ways that Computing Academics Understand Teaching, in Volume 66;
  • Cope, Jared - Automated Discovery of Search Interfaces on the Web, in Volume 17;
  • Coplien, James O. - Symmetry in Class and Type Hierarchy, in Volume 10;
  • Corbett, Dan - A Formalization of Subjective and Objective Time Ontologies, in Volume 85;
  • Corman, Amy - QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks, in Volume 62;
  • Costa, Vaston - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
  • Cowan, Greig A. - Storage and Data Management in EGEE, in Volume 68;
  • Coxson, Allan - 'When the Regulator Calls', in Volume 100;
  • Craig, Annemieke - Intervention Programmes to Recruit Female Computing Students: Why Do Programme Champions Do It?, in Volume 95;
  • Craik, Andrew - Reasoning about Data Parallelism in Modern Object-Oriented Languages, in Volume 74;
  • Cramp, Anthony - Employing Hierarchical Federation Communities in the Virtual Ship Architecture, in Volume 4;
  • Crane, Denis I. - Quantification of Neural Images using Grey Difference, in Volume 73;
  • Cranefield, Stephen - Educational Experiences From a Global Software Engineering (GSE) Project, in Volume 30; - Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory, in Volume 26;
  • Craswell, Nick - Automated Discovery of Search Interfaces on the Web, in Volume 17; - How Valuable is External Link Evidence When Searching Enterprise Webs?, in Volume 27; - Performance and Cost Tradeoffs in Web Search, in Volume 27;
  • Creek, Alan - Building Virtual Worlds with the Big-Bang Model, in Volume 9;
  • Cregan, Anne M. - Towards a Science of Definition, in Volume 58;
  • Crehan, Anna Corbo - Mabo-Style Claims to the Radio Spectrum, in Volume 1;
  • Crespo, Jose - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
  • Crimmins, Francis - How Valuable is External Link Evidence When Searching Enterprise Webs?, in Volume 27; - Performance and Cost Tradeoffs in Web Search, in Volume 27;
  • Crisp, David J. - A Useful Bound for Region Merging Algorithms in a Bayesian Model, in Volume 16; - Fast Segmentation of Large Images, in Volume 16;
  • Croft, Bruce - The Future of Web Search, in Volume 4;
  • Croll, Peter - Open Trusted Health Informatics Structure (OTHIS), in Volume 80; - Security Enhanced Linux to Enforce Mandatory Access Control in Health Information Systems, in Volume 80;
  • Croll, Peter R. - A Data Warehouse Architecture for Clinical Data Warehousing, in Volume 68; - Securing Grid Data Using Mandatory Access Controls, in Volume 68;
  • Crump, Barbara J. - New Arrival Students: Mitigating Factors on the Culture of the Computing Learning Environment, in Volume 30;
  • Cui, Bin - Diagonal Ordering: A New Approach to High-Dimensional KNN Processing, in Volume 27; - Exploring Bit-Difference for Approximate KNN Search in High-dimensional Databases, in Volume 39;
  • Cunningham, Andrew - Target Motion Analysis Visualisation, in Volume 45;
  • Cunningham, Colleen - A Taxonomy of Customer Relationship Management Analyses for Data Warehousing, in Volume 83;
  • Cuppens-Boulahia, Nora - Deploying Access Control in Distributed Workflow, in Volume 81;
  • Cuppens, Frederic - Deploying Access Control in Distributed Workflow, in Volume 81;
  • Curatolo, Raymond - Analytics for Audit and Business Controls in Corporate Travel and Entertainment, in Volume 70;
  • Cutts, Quintin - Connecting Learning Environments Using Electronic Voting Systems, in Volume 42; - Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52; - Predictors of success in a first programming course, in Volume 52; - The ability to articulate strategy as a predictor of programming skill, in Volume 52;
  • Cybulski, Jacob L. - A Set of Patterns for the Web-based Interfaces of an Employee Services System, in Volume 13;
  • Czezowski, Adam - Implemention Aspects of a SPARC V9 Complete Machine Simulator, in Volume 4;
Top of List

D

  • D'Onofrio, Salvatore - Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform, in Volume 44;
  • D'Souza, Daryl - A Taxonomic Study of Novice Programming Summative Assessment, in Volume 95; - Software Development Marketplaces - Implications for Plagiarism, in Volume 66; - Transforming learning of programming: a mentoring project, in Volume 78;
  • da Silva, Geiza M. H. - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
  • Dabrowski, Christopher - Using Markov Chain Analysis to Study Dynamic Behaviour in Large-Scale Grid Systems, in Volume 99;
  • Daggard, Grant - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61; - A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73;
  • Dagger, Paul - Securing Distributed Computing Against the Hostile Host, in Volume 26;
  • Dagiene, Valentina - Focus on the Pedagogical Dimension in ICT Literacy for Teachers, in Volume 23;
  • Dahl, Bettina - Constructive alignment and the SOLO taxonomy: a comparative study of university competences in computer science vs. mathematics, in Volume 88;
  • Daiqin He, Daisy - What is Required in Business Collaboration?, in Volume 92;
  • Dale, Robert - CORAL : Using Natural Language Generation for Navigational Assistance, in Volume 16; - Language Technology and Software Internationalisation, in Volume 32; - Natural Language Processing in the Undergraduate Curriculum, in Volume 20;
  • Dalrymple, Brian P. - Towards an understanding of protein-protein interaction network heirarchies. Analysis of DnaN-binding peptide motifs in members of protein families interacting with the eubacterial processivity clamp, the subunit of DNA Polymerase III, in Volume 19;
  • Dalziel, James - Trust Requirements in Identity Management, in Volume 44;
  • Dampney, C.N.G. (Kit) - Selected Tacit Knowledge Observations Within Two Organisations, in Volume 22; - The graphical interpretation of plausible tacit knowledge flows, in Volume 24; - Visual Mapping of Articulable Tacit Knowledge, in Volume 9;
  • Dance, Sandy - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26;
  • Dang, Xuan Hong - Discovering Frequent Sets from Data Streams with CPU Constraint, in Volume 70;
  • Dani, Anita - Conceptual Modelling of Computations On Data Streams, in Volume 43;
  • Daniel, Mats - Evolution of an International Collaborative Student Project, in Volume 95;
  • Daniels, Mats - A learning theory perspective on running open ended group projects (OEGPs), in Volume 78; - Five Myths of Assessment, in Volume 30; - Open Ended Group Projects a 'Tool' for More Effective Teaching, in Volume 20; - Qualitative Research Projects in Computing Education Research: An Overview, in Volume 52;
  • Danko, Ondrej - Elliptic Indexing of Multidimensional Databases, in Volume 92;
  • Danner, Norman - Circuit Principles and Weak Pigeonhole Variants, in Volume 41;
  • Dantin, Ursula - Application of Personas in User Interface Design for Educational Software, in Volume 42;
  • Darlington, John - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
  • Darwish, Nevin - A Study of Local and Global Thresholding Techniques in Text Categorization, in Volume 61;
  • Dasgupta, Aniruddha - CASO: A Framework for dealing with objectives in a constraint-based extension to AgentSpeak(L), in Volume 48;
  • Dash, Manoranjan - Graphics Hardware based Efficient and Scalable Fuzzy C-Means Clustering, in Volume 87;
  • Datta, Amitava - Dependable Dynamic Source Routing without a Trusted Third Party, in Volume 38;
  • Datta, Somnath - An Empirical Bayes Adjustment to Multiple p-values for the Detection of Differentially Expressed Genes in Microarray Experiments, in Volume 29;
  • Datta, Susmita - An Empirical Bayes Adjustment to Multiple p-values for the Detection of Differentially Expressed Genes in Microarray Experiments, in Volume 29;
  • Dattasharma, Abhi - Identifying Stock Similarity Based on Multi-event Episodes, in Volume 87;
  • Davies, Janet - Applications of variation theory in computing education, in Volume 88;
  • Davies, Pam - Self and Peer Assessment in Software Engineering Projects, in Volume 42;
  • Davis, Lynne - Comparing SVM Sequence Kernels: A Subcellular Localization Theme, in Volume 73;
  • Dawes, Ian - Learning Causal Networks from Microarray Data, in Volume 73;
  • Dawson, Ed - A Range Test Secure in the Active Adversary Model, in Volume 68; - Algebraic Analysis of LEX, in Volume 98; - Commitment Issues in Delegation Process, in Volume 81; - Faster Group Operations on Elliptic Curves, in Volume 98; - Five Sealed-bid Auction Models, in Volume 21; - Secure Key Issuing in ID-based Cryptography, in Volume 32; - SKMA - A Key Management Architecture for SCADA Systems, in Volume 54;
  • Dawson, Jeremy E. - Termination of Abstract Reduction Systems, in Volume 65;
  • Dawson, Robert - SKMA - A Key Management Architecture for SCADA Systems, in Volume 54;
  • Day, Adam - On Process Complexity, in Volume 94;
  • Dayalan, Saravanan - A Dihedral Angle Database of Short Sub-sequences for Protein Structure Prediction, in Volume 29;
  • de Albuquerque, Eduardo Simoes - Interactive Optimization in Cooperative Environments, in Volume 60;
  • De Bosschere, Koen - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
  • de Laborda, Cristian Perez - Relational.OWL - A Data and Schema Representation Format Based on OWL, in Volume 43;
  • de Raadt, Michael - An evaluation of electronic individual peer assessment in an introductory programming course, in Volume 88; - Chick Sexing and Novice Programmers: Explicit Instruction of Problem Solving Strategies, in Volume 52; - Computer Assisted Assessment of SQL Query Skills, in Volume 63; - Incorporating programming strategies explicitly into curricula, in Volume 88; - Introductory Programming: What's Happening Today and Will There Be Anyone to Teach Tomorrow?, in Volume 30; - Language Tug-Of-War: Industry Demand and Academic Choice, in Volume 20; - Predictors of success in a first programming course, in Volume 52; - Teaching and Assessing Programming Strategies Explicitly, in Volume 95; - The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
  • De Roeck, Anne - Measuring Improvement in Latent Semantic Analysis-Based Marking Systems: Using a Computer to Mark Questions about HTML, in Volume 66;
  • de Silva, Lavindra - Planning with Time Limits in BDI Agent Programming Languages, in Volume 65;
  • De Troyer, Olga - Conceptual Modeling for Virtual Reality, in Volume 83;
  • de Vasconcelos, Davi Romero - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
  • de Vries, Denise - A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values, in Volume 16; - Defining and Implementing Domains with Multiple Types using Mesodata Modelling Techniques, in Volume 53; - Discovering Itemset Interactions, in Volume 91; - Towards Active Conceptual Modelling for Sudden Events, in Volume 83;
  • de Vrieze, P. - Transformation selection for aptness-based web retrieval, in Volume 39;
  • Dean, David - Audio-Visual Speaker Verification using Continuous Fused HMMs, in Volume 56;
  • Debenham, John - Modelling Enterprise Architectures: An Approach Based on Linking Metaphors and Ontologies, in Volume 58; - Weighted Kernel Model For Text Categorization, in Volume 61;
  • Dehnadi, Saeed - Mental models, consistency and programming aptitude, in Volume 78;
  • Dehne, Frank - A Template Based Static Coalition Protocol - A3PviGrid, in Volume 54;
  • Dekeyser, Stijn - A Framework for Role-based group delegation in distributed environment, in Volume 48; - Computer Assisted Assessment of SQL Query Skills, in Volume 63; - Conflict Scheduling of Transactions on XML Documents, in Volume 27; - Peer-to-Peer Form Based Web Information Systems, in Volume 49; - Towards a Definition and Model for Metadata File Systems, in Volume 74;
  • Dekker, Anthony - Planning with Time Limits in BDI Agent Programming Languages, in Volume 65; - Visualisation of Social Networks Using CAVALIER, in Volume 9;
  • Dekker, Anthony H. - Network Robustness and Graph Topology, in Volume 26; - Simulating Network Robustness for Critical Infrastructure Networks, in Volume 38; - The Symmetry Ratio of a Network, in Volume 41;
  • Delcambre, Lois - Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE, in Volume 31;
  • Delcambre, Lois M. L. - Capturing Users' Everyday, Implicit Information Integration Decisions, in Volume 83;
  • Delwadia, Vipul - Using Remotely Executing Software via a Mobile Device, in Volume 93;
  • Demmers, Pieter - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
  • Deng, Da - A Wavelet-Based Neuro-Fuzzy System for Data Mining Small Image Sets, in Volume 32; - Visualisation and Comparison of Image Collections based on Self-organised Maps, in Volume 32;
  • Deng, Dixon D. S. - High-speed Parameterisable Hough Transform Using Reconfigurable Hardware, in Volume 11;
  • Deng, Sungen - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
  • Deng, Xiaotie - Exact Pattern Matching for RNA Secondary Structures, in Volume 29;
  • Denning, Tim - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
  • Denny - Exploratory Multilevel Hot Spot Analysis: Australian Taxation Office Case Study, in Volume 70;
  • Denny, Paul - Quality of Student Contributed Questions Using PeerWise, in Volume 95; - The PeerWise system of student contributed assessment questions, in Volume 78;
  • Deogun, Jitender S. - EMAGEN: An Efficient Approach to Multiple Whole Genome Alignment, in Volume 29; - Local Prediction Approach of Protein Classification using Probabilistic Suffix Trees, in Volume 29; - RNA Secondary Structure Prediction with Simple Pseudoknots, in Volume 29;
  • Deray, Kristine - Avatars: A Shifting Interaction, in Volume 11;
  • Dermoudy, Julian - A Novel Approach to Parenting in Functional Program Evaluation, in Volume 16; - An Anti-Plagiarism Editor for Software Development Courses, in Volume 42; - Engendering an Empathy for Software Engineering, in Volume 42;
  • Dessmark, Anders - On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
  • Detmold, Henry - A Domain Specific Language for Execution Profiling and Regulation, in Volume 91; - Garbage Collection for Storage-Oriented Clusters, in Volume 26; - Implementing a Family of Distributed Garbage Collectors, in Volume 16;
  • Deva, Paresh - JWS: A Flexible Web Service, in Volume 74;
  • Diaconescu, Roxana E. - Distributed Component Architecture for Scientific Applications, in Volume 10;
  • Diamond, Dermot - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
  • Dick, Geoffrey N. - Computer-based Collaboration in Student Work: Does a Preference for using Technology Affect Performance?, in Volume 46;
  • Dick, Grant - On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma, in Volume 26;
  • Dick, Martin - Adopting XP Practices for Teaching Object Oriented Programming, in Volume 52; - Automating the Estimation of Project Size from Software Design Tools Using Modified Function Points, in Volume 30; - Determination of Factors which Impact on IT Students' Propensity to Cheat, in Volume 20; - Using Extreme Programming in a Capstone Project, in Volume 30;
  • Diebold, Boris - Usage-based Visualization of Web Locations, in Volume 9;
  • Dieperink, Carel - Improving Environmental Decision-making: Bridging the Gap between Conceptual Modelling and Quantitative Analyses with Quasta, in Volume 83;
  • Diepeveen, Dean - The application of data mining techniques to characterize agricultural soil profiles, in Volume 70;
  • Dietrich, Jens - Survey of Existing Languages to Model Interactive Web Applications, in Volume 79;
  • Dillon, Tharam - Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling, in Volume 79;
  • Dillon, Tharam S. - A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively, in Volume 38;
  • Dine, Gerald - Evaluation of Unique Sequences on the European Data Grid, in Volume 19;
  • Ding, Yi - Recency-Based Collaborative Filtering, in Volume 49;
  • Disseldorp, Bronwyn - Selecting the Right Technology for Students in a Changing Teaching Environment : A Case Study, in Volume 23;
  • Dittenbach, Michael - An Adaptive Information Retrieval System Based on Associative Networks, in Volume 31; - Improving Domain Ontologies by Mining Semantics from Text, in Volume 31;
  • Dittmann, Henrik - Extraction, evaluation and integration of lexical-semantic relations for the automated construction of a lexical ontology, in Volume 85;
  • Ditze, Michael - Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices, in Volume 26;
  • do Nascimento, Hugo A. Dantas - Interactive Optimization in Cooperative Environments, in Volume 60;
  • do Nascimento, Hugo A.D. - A Framework for Human-Computer Interaction in Directed Graph Drawing, in Volume 9; - A System for Graph Clustering Based on User Hints, in Volume 2; - User Hints for Map Labelling, in Volume 16;
  • Dobbie, Gill - Sketching ER Diagrams, in Volume 93;
  • Dobbie, Gillian - A Maturity Model for Computing Education, in Volume 66; - Automated Usability Testing Framework, in Volume 76; - Databases, But Not As We Know Them, in Volume 27; - Mining Association Rules from XML Data using XQuery, in Volume 32; - Towards Verifying Semistructured Data, in Volume 67;
  • Dobele, Tony - This Course Has A Bloom Rating Of 3.9, in Volume 30;
  • Doerr, Martin - The CIDOC Conceptual Reference Model - A New Standard for Knowledge Sharing, in Volume 83;
  • Doherty, Michelle - 3D Visualisation of Tumours and Blood Vessels in Human Liver, in Volume 22;
  • Doi, Atsushi - Integrating Biopathway Databases for Large-scale Modeling and Simulation, in Volume 29;
  • Dong, Ce - Merging Dynamic Functionality: Integration of XML Transformations, in Volume 67; - Static Analysis of XSLT Programs, in Volume 27;
  • Dongol, Brijesh - Concurrent Program Design in the Extended Theory of Owicki and Gries, in Volume 41;
  • Donis, Ruben - RNA Secondary Structure Prediction with Simple Pseudoknots, in Volume 29;
  • Donohoo, Andrew - Layered Earth Inversion Visual Toolkit: A Scientific Visualisation Case Study, in Volume 11;
  • Donovan, Jared - Talking about watching: Using the Video Card Game and wiki-web technology to engage IT students in developing observational skills, in Volume 20; - Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
  • Dooley, Laurence - Gestalt Theory in Visual Screen Design - A New Look at an Old Subject, in Volume 8;
  • dos Santos, Neide - Applying Ontologies in the Integration of Heterogeneous Relational Databases, in Volume 58;
  • Doucet, Anne - A Two-Phase Commit Protocol for Mobile Wireless Environment, in Volume 39;
  • Dowling, Carolyn - Intelligent Agents: Some Ethical Issues and Dilemmas, in Volume 1; - The Role of the Human Teacher in Learning Environments of the Future, in Volume 23;
  • Dowling, Greg - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42;
  • Dowling, Jason - Characterizing Image Properties for Digital Mammograms, in Volume 97;
  • Downes, Toni - Raising the Standards : ICT and the Teacher of the Future, in Volume 23; - The Playable Computer: Young Children's Home Computing Experiences , in Volume 34; - Young Children Talking about Their Use of the Internet at Home and at School , in Volume 34;
  • Downey, Rodney G. - Bounded Persistence Pathwidth, in Volume 41;
  • Doyle, Bernard - Why Teach Unix?, in Volume 66;
  • Drago, Sara - From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
  • Dras, Mark - A Two-Pronged Attack on the Dragon of Intractability, in Volume 38; - Approaches for Semantic Interoperability between Domain Ontologies, in Volume 72; - DASMAS - Dialogue based Automation of Semantic interoperability in Multi Agent Systems, in Volume 58;
  • Drias, Habiba - A Two-Phase Commit Protocol for Mobile Wireless Environment, in Volume 39;
  • Drummond, Alexei - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29;
  • Drury, Helen - Student satisfaction with groupwork in undergraduate computer science : do things get better?, in Volume 20;
  • du Boulay, Douglas - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
  • Du, Jiang - Performance Factors Analysis of a Wavelet-based Watermarking Method, in Volume 44; - Recovery of Watermark Using Differential Affine Motion Estimation, in Volume 44;
  • Du, Rong - Defining Security Services for Electronic Tendering, in Volume 32; - Formal Analysis of Secure Contracting Protocol for E-Tendering, in Volume 54; - Layered Identity Infrastructure Model for Identity Meta Systems, in Volume 81;
  • Du, Wenliang - Building Decision Tree Classifier on Private Data, in Volume 14;
  • Dubois, Eric - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
  • Duckworth, William - Large k-Separated Matchings of Random Regular Graphs, in Volume 38;
  • Duffert, Uwe - Frequency Space Representation of Transitions of Quadruped Robot Gaits, in Volume 26;
  • Duignan, Matthew - Evaluating Scalable Vector Graphics for Use in Software Visualisation, in Volume 24; - Visualising Reusable Software Over The Web, in Volume 9;
  • Duke, David - Modular Techniques in Information Visualization, in Volume 9;
  • Duke, Roger - A Reference Architecture for Instructional Educational Software, in Volume 46;
  • Dukka, Bahadur K.C. - Protein Side-chain Packing Problem: A Maximum Edge-weight Clique Algorithmic Approach, in Volume 29;
  • Dumas, M. - Patterns for e-service composition, in Volume 13; - Product Flow Analysis in Distribution Networks with a Fixed Time Horizon, in Volume 74;
  • Dumas, Marlon - A Programming Language for Web Service Development, in Volume 38; - Synthesis of Orchestrators from Service Choreographies, in Volume 96; - When are two Workflows the Same?, in Volume 41;
  • Duncombe, David - Synapse: Auto-correlation and Dynamic Attack Redirection in an Immunologically-inspired IDS, in Volume 54;
  • Dunn, Adam - Environment-Independent Performance Analyses of Cryptographic Algorithms, in Volume 16;
  • Dunne, Lucy E. - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
  • Duong, Maggie - An Integrated Access Control for Securely Querying and Updating XML Data, in Volume 75; - LSDX: A New Labelling Scheme for Dynamically Updating XML Data, in Volume 39;
  • Dwyer, Joanne - Computer Based Learning in NSW Primary Schools. Early Childhood v's Primary , in Volume 34;
  • Dwyer, Tim - A Scalable Method for Visualising Changes in Portfolio Data, in Volume 24; - Extending the WilmaScope 3D Graph Visualisation System - Software Demonstration, in Volume 45; - Optimal Leaf Ordering for Two and a Half Dimensional Phylogenetic Tree Visualisation, in Volume 35; - Representing Experimental Biological Data in Metabolic Networks, in Volume 29; - Skeletal Animation for the Exploration of Graphs, in Volume 35; - Three Dimensional UML Using Force Directed Layout, in Volume 9; - Visual Analysis of Network Centralities, in Volume 60;
  • Dyreson, Curtis - Approximate Retrieval of XML Data with ApproXPath, in Volume 75;
Top of List

E

  • Eades, Peter - A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization, in Volume 38; - A System for Graph Clustering Based on User Hints, in Volume 2; - Automatic Camera Path Generation for Graph Navigation in 3D, in Volume 45; - Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters, in Volume 45; - How People Read Graphs, in Volume 45; - How People Read Sociograms: A Questionnaire Study, in Volume 60; - MoneyTree: Ambient Information Visualization Of Financial Data, in Volume 36; - Predicting Graph Reading Performance: A Cognitive Approach, in Volume 60; - User Hints for Map Labelling, in Volume 16; - Using MoneyColor to Represent Financial Data, in Volume 45; - Using Spring Algorithms to Remove Node Overlapping, in Volume 45;
  • Eales, R. T. Jim - A Knowledge Management Approach to User Support, in Volume 28;
  • East, Philip - What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
  • Eberl, Stefan - A Solution to the Distribution and Standarization of Multimedia Medical Data in E-Health, in Volume 11; - Integrated Multimedia Medical Data Agent in E-Health, in Volume 11;
  • Eckerdal, Anna - Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78; - What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
  • Edmond, David - Making Workflows Context-aware: A Way to Support Knowledge-intensive Tasks, in Volume 79;
  • Edmonds, Ernest - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
  • Edwards, Brett - Clustering and Classification of Maintenance Logs using Text Data Mining, in Volume 87;
  • Edwards, C. B. H. - The Role of the Evaluator in Australian Defence Standard Def (Aust) 5679, in Volume 100;
  • Edwards, Chris - Guidance for Def (Aust) 5679 Issue 2, in Volume 100;
  • Edwards, Jenny - The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78; - Towards understanding the non-technical work experiences of recent Australian information technology graduates, in Volume 78;
  • Edwards, Sylvia L. - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
  • Eeckhout, Lieven - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
  • Egea, Kathy - Managing the managers: Collaborative virtual teams with large staff and student numbers, in Volume 20;
  • Ehrig, Marc - Measuring Similarity between Semantic Business Process Models, in Volume 67;
  • Eisman, Gerry - Approximate Recognition of Non-regular Languages by Finite Automata, in Volume 38;
  • Eitrich, Tatjana - On The Optimal Working Set Size in Serial and Parallel Support Vector Machine Learning With The Decomposition Algorithm, in Volume 61;
  • Ekins, Chris - Dealing with Geospatial Information in the Semantic Web, in Volume 58;
  • El Gindy, Hossam - High-speed Parameterisable Hough Transform Using Reconfigurable Hardware, in Volume 11;
  • Elci, Atilla - Enterprise Semantic Information Search System Based on New Music and Audio Ontology Integrating Existing Ontologies, in Volume 85;
  • ElGindy, Hossam - On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm, in Volume 26;
  • Ellims, Michael - On Wheels, Nuts and Software, in Volume 47;
  • Elliott, Alison - Reflections and Directions: Transforming Early Childhood Pedagogies with Learning Technologies , in Volume 34;
  • Elmasry, Amr - On the Power of Structural Violations in Priority Queues, in Volume 65;
  • Elms, Kim - Internationalisation in the Web Services Domain, in Volume 32;
  • Embley, David W. - Towards Semantic Understanding - An Approach Based on Information Extraction Ontologies, in Volume 27;
  • Engel, Thomas - Acimn: A protocol for Anonymous Communication In Multi hop wireless networks, in Volume 81; - Slotted Packet Counting Attacks on Anonymity Protocols, in Volume 98;
  • Enkhsaikhan, Majigsuren - Measuring Data-Driven Ontology Changes using Text Mining, in Volume 70;
  • Enticott, Colin - Optimizing Tunneled Grid Connectivity across Firewalls, in Volume 99;
  • Epps, Julien - Visualisation of Reduced-Dimension Microarray Data Using Gaussian Mixture Models, in Volume 45;
  • Eremin, Evgeny A. - Using topic map technology in the planning of courses from the CS knowledge domain, in Volume 88;
  • Erkkola, Teemu - Fighting the student dropout rate with an incremental programming assignment, in Volume 88;
  • Erlinger, Michael A. - TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
  • Erlinger, Mike - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
  • Ertl, T. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
  • Erwin, Alva - A Bottom-Up Projection Based Algorithm for Mining High Utility Itemsets, in Volume 84;
  • Eschner, Lisa - Event-based Communication for Location-based Service Collaboration, in Volume 92;
  • Escott, Eban - Using Animations to Support the Teaching of General Computing Concepts, in Volume 30;
  • Espinosa, Linda M. - Appropriation, Mastery and Resistance to Technology in Early Childhood Preservice Teacher Education: Case Studies, in Volume 34; - Using Technology to Support the Learning and Social Development of Young Children , in Volume 34;
  • Esser, Robert - Higher-Order Petri Net Modelling - Techniques and Applications, in Volume 12; - Lightweight Consistency Analysis of Dataflow Process Networks, in Volume 16; - Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking, in Volume 26;
  • Estivill-Castro, Vladimir - A New Efficient Privacy-Preserving Scalar Product Protocol, in Volume 70; - Computing Nash Equilibria Gets Harder: New Results Show Hardness Even for Parameterized Complexity, in Volume 94; - Dogs or Robots - Why do Children See Them as Robotic Pets Rather Than Canine Machines?, in Volume 28; - Mutually Visible Agents in a Discrete Environment, in Volume 62; - Preface: Proceedings of the ICDM 2002 Workshop on Privacy, Security and Data Mining, in Volume 14; - The Privacy of k-NN Retrieval for Horizontal Partitioned Data - New Methods and Applications, in Volume 63;
  • Evans, Joanne - Automatically Generated Consumer Health Metadata Using Semantic Spaces, in Volume 80;
  • Evered, Mark - A Case Study in Access Control Requirements for a Health Information System, in Volume 32; - Bracket Capabilities for Distributed Systems Security, in Volume 4; - Flexible Enterprise Access Control with Object-oriented View Specification, in Volume 21; - Opsis - A Distributed Object Architecture Based on Bracket Capabilities, in Volume 10;
  • Everts, Timothy J. - Using Formal Concept Analysis with an Incremental Knowledge Acquisition System for Web Document Management, in Volume 48;
Top of List

F

  • Fabre, John - Trust Requirements in Identity Management, in Volume 44;
  • Fagin, Ronald - Finite Model Theory and its Origins, in Volume 96;
  • Falkner, Katrina - A Domain Specific Language for Execution Profiling and Regulation, in Volume 91; - Easing the Transition: A Collaborative Learning Approach, in Volume 95; - Garbage Collection for Storage-Oriented Clusters, in Volume 26;
  • Fallis, Don - Social Epistemology and the Digital Divide, in Volume 37;
  • Fallon, Tony - Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
  • Fan, Hongjian - A Bayesian Approach to Use Emerging Patterns for Classification, in Volume 17;
  • Farago, Andras - Structural Properties of Random Graph Models, in Volume 94;
  • Farias, Oscar L. M. - Applying Ontologies in the Integration of Heterogeneous Relational Databases, in Volume 58;
  • Farinha, Jos - A Data Quality Metamodel Extension to CWM, in Volume 67;
  • Farr, Graham - On pedagogically sound examples in public-key cryptography, in Volume 48;
  • Faulconbridge, Ian - Unsupervised band removal leading to improved classification accuracy of hyperspectral images, in Volume 48;
  • Faulkner, Stephane - Clarifying Goal Models, in Volume 83;
  • Faulkner, Xristine - Open Ended Group Projects a 'Tool' for More Effective Teaching, in Volume 20;
  • Fauvet, M.-C. - Patterns for e-service composition, in Volume 13;
  • Feiner, Steven - On Beyond GUI, in Volume 64;
  • Fekete, Alan - Learner Reflection in Student Self-assessment, in Volume 66; - Transactions in Loosely Coupled Distributed Systems, in Volume 17; - Using Counter-Examples in the Data Structures Course, in Volume 20;
  • Feng, David D. - 3D Reconstruction of Single Picture, in Volume 36; - A 3D Image Smoothing Method for Dynamic Functional Imaging, in Volume 2; - A Simulation Study of Using ER Feedback Control to Transport Compressed Video over ATM Networks, in Volume 2; - A Solution to the Distribution and Standarization of Multimedia Medical Data in E-Health, in Volume 11; - A Statistical Method for Assessment of 3-D Medical Image Registration, in Volume 2; - A Telemedicine System over Internet, in Volume 2; - A Web Based Medical Image Data Processing and Management System, in Volume 2; - A Web-based Collaborative System for Medical Image Analysis and Diagnosis, in Volume 2; - Automatic Detection of PET Lesions, in Volume 22; - Cataloging and Search Engine for Video Library, in Volume 2; - Elastic Medical Image Registration Based on Image Intensity, in Volume 11; - Face Recognition Using Multi-feature and Radial Basis Function Network, in Volume 22; - Functional Segmentation of Dynamic Emission Tomographic images, in Volume 2; - Integrated Multimedia Medical Data Agent in E-Health, in Volume 11; - Molecular Imaging and Biomedical Process Modeling, in Volume 29; - Non-Invasive estimation of Cerebral Metabolic Rate of Glucose Using Simultaneous Estimation and Cluster Analysis: A feasibility Study, in Volume 2; - Novel Elastic Registration for 2-D Medical and Gel Protein Images, in Volume 19; - Numerical Deconvolution by a Monte Carlo Approach with Application to Dynamic Cardiac Perfusion Tc-99m SPECT, in Volume 11; - Optimal Selection of Image Segmentation Algorithms Based on Performance Prediction, in Volume 36; - Segmentation-Based Multilayer Diagnosis Lossless Medical Image compression, in Volume 36; - Variational Segmentation and PCA Applied to Dynamic PET Analysis, in Volume 22; - Web-based Image Authentication Using Invisible Fragile Watermark, in Volume 11; - Web-based Multimedia Collaboration System for Medical Images Analysis and Diagnosis, in Volume 22;
  • Fenn, Jane - A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments, in Volume 33;
  • Fenwick, Joel - Mutually Visible Agents in a Discrete Environment, in Volume 62;
  • Fergusson, David - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54;
  • Ferizis, George - On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm, in Volume 26;
  • Fernandes de Macedo, Jose Antonio - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83;
  • Fernandez, George - CONFER: Towards Groupware for Building Consensus in Collaborative Software Engineering, in Volume 64;
  • Ferrarotti, Flavio A. - On the Computation of Approximations of Database Queries, in Volume 27;
  • Ferreira, Jennifer - A Case for Iconic Icons, in Volume 50; - The Semiotics of User Interface Redesign, in Volume 40;
  • Ferreira, Joelma de Moura - Interactive Optimization in Cooperative Environments, in Volume 60;
  • Fetherston, T. - A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies, in Volume 38;
  • Fetherston, Tony - What Information and Communication Technologies Courses Should Be Taught at a New Senior College?, in Volume 8;
  • Fiddian, N.J. - Establishing an XML Metadata Knowledge Base to Assist Integration of Structured and Semi-structured Databases, in Volume 49;
  • Fidge, C. J. - Product Flow Analysis in Distribution Networks with a Fixed Time Horizon, in Volume 74;
  • Fidge, Colin - Cross-Layer Verification of Type Flaw Attacks on Security Protocols, in Volume 62; - Losing Their Marbles: Syntax-Free Programming for Assessing Problem-Solving Skills, in Volume 95; - On the efficacy of prerecorded lectures for teaching introductory programming, in Volume 78; - Relative Simulation and Model Checking of Real-Time Processes, in Volume 74; - Tracing Information Flow Through Mode Changes, in Volume 48;
  • Fiedler, Gunar - Database Collaboration Instead of Integration, in Volume 43;
  • Field, Tony - Optimising Parallel Pattern-matching by Source-level Program Transformation, in Volume 38;
  • Fife, Leslie - Simple Eight Bit, Emulated Computers for Illustrating Computer Architecture Concepts and Providing a Starting Point for Student Designs, in Volume 66;
  • Figueroa, Alejandro - Mining Web Snippets to Answer List Questions, in Volume 84;
  • Figueroa, Andres - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
  • Filho, Jugurta Lisboa - Improving Productivity and Quality of GIS Databases Design using an Analysis Pattern Catalog, in Volume 43;
  • Filsell, Jenny - Researching Pedagogy and Teaching Methodologies that Transform Student Learning in South Australian Classrooms, in Volume 8;
  • Fincher, Sally - Multi-Institutional Teaching Communities in Computer Education, in Volume 52; - Predictors of success in a first programming course, in Volume 52; - The ability to articulate strategy as a predictor of programming skill, in Volume 52;
  • Finegan, Andrew - Information Technology Online: A Knowledge Framework for Curriculum Externalisation, in Volume 52;
  • Fink, J. L. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
  • Finkel, Raphael A. - Signature Extraction for Overlap Detection in Documents, in Volume 4;
  • Fischer, Ronald - Persuasive Interaction for Collectivist Cultures, in Volume 50;
  • Fischmeister, Sebastian - MUSA-Shadow: Concepts, Implementation and Sample Applications - A Location-Based Service Supporting Multiple Devices, in Volume 10;
  • Fisher, Damien K. - Dynamic Labeling Schemes for Ordered XML Based on Type Information, in Volume 49; - Querying and Maintaining Ordered XML Data using Relational Databases, in Volume 39;
  • Fisher, Tony - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
  • Fishkin, Aleksei V. - On Packing Squares with Resource Augmentation: Maximizing the Profit, in Volume 41;
  • Fitzgerald, Brian - Defining Security Services for Electronic Tendering, in Volume 32;
  • Fitzpatrick, Geraldine - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
  • Flake, Stephan - Towards the Completion of the Formal Semantics of OCL 2.0, in Volume 26;
  • Fleurke, Martin - Monitoring and Controlling of a Multi-agent Based Workflow System, in Volume 32;
  • Flint, Shayne - Executable/Translatable UML in Computing Education, in Volume 30;
  • Floridi, Luciano - Informational Realism, in Volume 37;
  • Fluck, Andrew - A Systems Approach to ICT in School Education , in Volume 34; - Why Isn't ICT as Effective as it Ought To Be in School Education?, in Volume 23;
  • Foo, Ernest - Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets, in Volume 62; - Defining Security Services for Electronic Tendering, in Volume 32; - Formal Analysis of Secure Contracting Protocol for E-Tendering, in Volume 54; - Layered Identity Infrastructure Model for Identity Meta Systems, in Volume 81; - Secure Data Aggregation in Wireless Sensor Network: a survey, in Volume 81; - Visually Sealed and Digitally Signed Documents, in Volume 26;
  • Foo, Jun Jie - Pruning SIFT for Scalable Near-duplicate Image Matching, in Volume 63;
  • Fookes, Clinton - Assessing Viewing Pattern Consistency in Mammogram Readers, in Volume 97;
  • Foote, Brian - Attack of the Clones, in Volume 13;
  • Foster, Ian - Computing Outside the Box, in Volume 91; - Computing Outside the Box, in Volume 99;
  • Foulger, Cameron - Data Flow and Validation in Workflow Modelling, in Volume 27;
  • Fourmentin, Eric - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
  • Francis, Lishoy - Countermeasures for Attacks on Satellite TV Cards using Open Receivers, in Volume 44;
  • Franco, Luis - Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98; - Security Enhanced Linux to Enforce Mandatory Access Control in Health Information Systems, in Volume 80;
  • Fraser, R. - Service Oriented Grid Architecture for Geosciences Community, in Volume 68;
  • Frasincar, Flavius - XAL: An Algebra For XML Query Optimization, in Volume 5;
  • Frattolillo, Franco - Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform, in Volume 44;
  • Freeman, Darren - Hardware Acceleration of JPEG2000 Image Compression for Low-Power Embedded Applications, in Volume 16;
  • Freeman, Isaac J. - Connector Semantics for Sketched Diagram Recognition, in Volume 64;
  • Freischlad, Stefan - Exploration module for understanding the functionality of the internet in secondary education, in Volume 88;
  • Frew, Zelda - Similarity and originality in code: plagiarism and normal variation in student assignments, in Volume 52;
  • Friedrich, Carsten - Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size, in Volume 26; - Visualisation of Satisfiability using the Logic Engine, in Volume 45;
  • Friese, Thomas - Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids, in Volume 82;
  • Frikken, Keith - Remote Revocation of Smart Cards in a Private DRM System, in Volume 44;
  • Frost, Laura - On pedagogically sound examples in public-key cryptography, in Volume 48;
  • Fu, Alan M.N. - A Hierarchical Approach in Multilevel Thresholding Based on Maximum Entropy and Bayes' Formula, in Volume 11; - Comparison of Five Conditional Probabilities in 2-Level Image Threshold Based on Bayesian Formulation, in Volume 2;
  • Fu, Jung-Sheng - Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network, in Volume 6;
  • Fu, Xiaoyan - Haptic Shoes: Representing Information By Vibration, in Volume 45;
  • Fuad, Mohammed M. - AdJava - Automatic Distribution of Java Applications, in Volume 4;
  • Fuericht, Reinhard - A Component-Based Application Framework for Manufacturing Execution Systems in C# and .NET, in Volume 10;
  • Fuh, Gene Y. C. - Aggregate Predicate Support in DBMS, in Volume 5;
  • Fujita, Hitoshi - Minimum Cost Source Location Problem with Local 3-Vertex-Connectivity Requirements, in Volume 41;
  • Fukazawa, Yoshiaki - Dynamic Hierarchical Undo Facility in a Fine-Grained Component Environment, in Volume 10;
  • Fukuda, Ken Ichiro - A Pathway Editor for Literature-based Knowledge Curation, in Volume 29;
  • Fukuhara, Hideaki - Lower Bounds on Quantum Query Complexity for Read-Once Decision Trees with Parity Nodes, in Volume 94;
  • Fukushima, Yuji - An XML Document Transformation Algorithm Inferred from an Edit Script between DTDs, in Volume 75;
  • Fule, Peter - Detecting Privacy and Ethical Sensitivity in Data Mining Results, in Volume 26; - Experiences in Building a Tool for Navigating Association Rule Result Sets, in Volume 32; - SemGrAM - Integrating Semantic Graphs into Association Rule Mining, in Volume 70;
  • Fulga, Florin - A New Program to Compute the Surface Properties of Biomolecules, in Volume 19;
  • Fulham, Michael J. - Functional Segmentation of Dynamic Emission Tomographic images, in Volume 2; - Non-Invasive estimation of Cerebral Metabolic Rate of Glucose Using Simultaneous Estimation and Cluster Analysis: A feasibility Study, in Volume 2; - Numerical Deconvolution by a Monte Carlo Approach with Application to Dynamic Cardiac Perfusion Tc-99m SPECT, in Volume 11;
  • Fuller, Ursula - Facilitating Global Computing Education Through Study Abroad and Collaborative Projects, in Volume 52; - Should we assess our students' attitudes?, in Volume 88;
  • Fulton, Roger - A 3D Image Smoothing Method for Dynamic Functional Imaging, in Volume 2;
  • Fung, Peggy - Electronic Information Security Documentation, in Volume 21;
  • Furness III, Thomas A. - A Quest For The Ultimate Interface, in Volume 50;
  • Furuse, Kazutaka - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
  • Fusenig, Volker - Acimn: A protocol for Anonymous Communication In Multi hop wireless networks, in Volume 81; - Slotted Packet Counting Attacks on Anonymity Protocols, in Volume 98;
  • Fuster-Sabater, Amparo - Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences, in Volume 81;
Top of List

G

  • G, Sridhar - Identifying Stock Similarity Based on Multi-event Episodes, in Volume 87;
  • Gaber, Mohamed Medhat - Cost-Efficient Mining Techniques for Data Streams, in Volume 32; - Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks, in Volume 75;
  • Gaeta, Bruno - Learning Causal Networks from Microarray Data, in Volume 73;
  • Gaikwad, Rekha - Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
  • Gal, Andreas - AspectC++: An Aspect-Oriented Extension to the C++ Programming Language, in Volume 10;
  • Galang, Gerson - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
  • Gallagher, Marcus - Higher Order HMMs for Localization Prediction of Transmembrane Proteins, in Volume 73;
  • Gallasch, Guy - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12;
  • Galloway, John - Network Data Mining: Methods and Techniques for Discovering Deep Linkage between Attributes, in Volume 53; - Selected Tacit Knowledge Observations Within Two Organisations, in Volume 22;
  • Ganguly, Pronab - Bridging Semantic Gap, in Volume 13;
  • Ganguly, Sumit - Distributing Frequency-Dependent Data Stream Computations, in Volume 94;
  • Gani, Hendrik - Improving the Transparency of Proxy Injection in Java, in Volume 91;
  • Gao, Junbin - A Discriminant Analysis for Undersampled Data, in Volume 84; - A Multi-step Strategy for Approximate Similarity Search in Image Databases, in Volume 49;
  • Gao, Peng - A Linear Time Algorithm for Pricing European Sequential Barrier Options, in Volume 65;
  • Gao, Wenying Wendy - Multimedia Index and Retrieval Under MARC Framework, in Volume 22;
  • Garcia-Remesal, Miguel - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
  • Garcia, Steven - Access-Ordered Indexes, in Volume 26;
  • Gardner, Henry - eScience Curricula at Two Australian Universities, in Volume 42; - Executable/Translatable UML in Computing Education, in Volume 30; - Line Drawing in Virtual Reality using a Game Pad, in Volume 50;
  • Garg, Saurabh Kumar - Scheduling Parallel Applications on Utility Grids: Time and Cost Trade-off Management, in Volume 91;
  • Garlan, David - Architecture-driven Modelling and Analysis, in Volume 69;
  • Garner, Sandy - My Program is Correct But it Doesn't Run: A Preliminary Investigation of Novice Programmers' Problems, in Volume 42; - Problem Distributions in a CS1 Course, in Volume 52;
  • Gartner, J. U. - Certified Software Factory: Open Software Toolsuites, Safe Methodologies and System Architectures, in Volume 69;
  • Gascuel, Jean-D. - Interactive Mediated Reality, in Volume 40;
  • Gaudiot, Jean-Luc - Alias Analysis for Exceptions in Java, in Volume 4;
  • Gawler, Mark - Predictive Model of Insolvency Risk for Australian Corporations, in Volume 70;
  • Gayler, Ross - Adaptive Spike Detection for Resilient Data Stream Mining, in Volume 70; - Towards Scalable Real-Time Entity Resolution using a Similarity-Aware Inverted Index Approach, in Volume 87;
  • Ge, Esther - Data Mining For Lifetime Prediction of Metallic Components, in Volume 61;
  • Gebauer, Heidi - Fast Exponential-Time Algorithms for the Forest Counting in Graph Classes, in Volume 65;
  • Geldof, Sabine - CORAL : Using Natural Language Generation for Navigational Assistance, in Volume 16;
  • Geoghegan, Sean - Dealing with Geospatial Information in the Semantic Web, in Volume 58;
  • Georgakopoulos, Dimitrios - Engineering Agile Systems, in Volume 92;
  • George, Susan E. - Learning and the Reflective Journal in Computer Science, in Volume 4;
  • Gerber, Olga - On Packing Squares with Resource Augmentation: Maximizing the Profit, in Volume 41;
  • Gerson, Andrea - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
  • Getta, Janusz - Conceptual Modelling of Computations On Data Streams, in Volume 43;
  • Geva, Shlomo - News Aware Volatility Forecasting: Is the Content of News Important?, in Volume 70; - What Types of Events Provide the Strongest Evidence that the Stock Market is Affected by Company Specific News?, in Volume 61;
  • Ghandar, Adam - Pattern Puzzle: A Metaphor for Visualizing Software Complexity Measures, in Volume 60;
  • Ghani, Neil - Constructing Strictly Positive Families, in Volume 65;
  • Ghatti, Venkat Ram - Identifying Character Non-Independence in Phylogenetic Data Using Data Mining Techniques, in Volume 29;
  • Ghose, Aditya - Model Eco-Systems: Preliminary Work, in Volume 79;
  • Ghose, Aditya K. - Business Process Integration: Method and Analysis, in Volume 96; - CASO: A Framework for dealing with objectives in a constraint-based extension to AgentSpeak(L), in Volume 48;
  • Ghosh, Ranadhir - A Semantic Approach to Boost Passage Retrieval Effectiveness for Question Answering, in Volume 48; - Applying Anatomical Therapeutic Chemical (ATC) and Critical Term Ontologies to Australian Drug Safety Data for Association Rules and Adverse Event Signalling, in Volume 58;
  • Ghous, Hamid - Kernel-based Visualisation of Genes with the Gene Ontology, in Volume 87;
  • Giannakos, Aristotelis - Greedy algorithms for on-line set-covering and related problems, in Volume 51;
  • Gibbs, Donna - A Jump-start in Learning? Young Children's Use of CDRom Technology, in Volume 34;
  • Gibbs, Tanton H. - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
  • Gibson, J. Paul - Automated Assessment in CS1, in Volume 52;
  • Gil, Pedro - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
  • Gilbert, David - An Empirical Comparison of Supervised Machine Learning Techniques in Bioinformatics, in Volume 19;
  • Gill, Rupinder - Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks, in Volume 54;
  • Gilmour, Stephen - A Two-Pronged Attack on the Dragon of Intractability, in Volume 38;
  • Gipps, John - Data Logging and Inquiry Learning in Science, in Volume 8;
  • Glynn, Erica - Integration of generic program analysis tools into a software development environment, in Volume 38;
  • Go, Nobuhiro - Toward Building Grid Applications in Bioinformatics, in Volume 54;
  • Gockelmann, R. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
  • Godat, Meredith - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42;
  • Godfrey, Bob - Electronic Work Monitoring: An Ethical Model, in Volume 1;
  • Godinet, Helene - Distant Actors On a Digital Campus, or Sharing and Crumbling Pedagogical Responsibility, in Volume 23;
  • Goecke, Roland - Audio-Video Automatic Speech Recognition: An Example of Improved Performance through Multimodal Sensor Input, in Volume 57; - Learning Active Appearance Models from Image Sequences, in Volume 56;
  • Goedecke, David - The Role of the Software Practitioner in the Development of Public Safety Software-intensive Systems, in Volume 86;
  • Goeman, Bart - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
  • Goh, Liang - A Novel Feature Selection Method to Improve Classification of Gene Expression Data, in Volume 29;
  • Goiser, Karl - Towards Automated Record Linkage, in Volume 61;
  • Goldman, Debora - Reality Bytes : A Reflection of the Perception Versus The Reality of Teaching with ICT, in Volume 23;
  • Goldman, Grigori - Periodical Payment Model Using Restricted Proxy Certificates, in Volume 62;
  • Goldson, Doug - Concurrent Program Design in the Extended Theory of Owicki and Gries, in Volume 41;
  • Goldstein, Avraham - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
  • Goldstein, Cecil - Using a Network Simulation Tool to Engage Students in Active Learning Enhances Their Understanding of Complex Data Communications Concepts., in Volume 42;
  • Goldweber, Michael - A Comparison of Different Approaches to the Introductory Programming Course, in Volume 52;
  • Gollmann, Dieter - A Method for Access Authorisation Through Delegation Networks, in Volume 54;
  • Golob, Izidor - Early Assessment of Classification Performance, in Volume 32;
  • Gomes, Pedro - A Data Quality Metamodel Extension to CWM, in Volume 67;
  • Gomez, Sergio Alejandro - An Argumentative Approach to Reasoning with Inconsistent Ontologies, in Volume 90;
  • Gong, Xiujun - Toward Building Grid Applications in Bioinformatics, in Volume 54;
  • Gonsalves, Atish - The Effect of Context and Application Type on Mobile Usability: An Empirical Study, in Volume 38;
  • Gonzalez Nieto, Juan Manuel - Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets, in Volume 62; - ID-based One-pass Authenticated Key Establishment, in Volume 81; - Secure Data Aggregation in Wireless Sensor Network: a survey, in Volume 81;
  • Gonzalez-Nieto, Juan Manuel - SKMA - A Key Management Architecture for SCADA Systems, in Volume 54;
  • Gonzalez-Nieto, Juan Manuel - Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework, in Volume 54;
  • Gonzalez-Perez, Cesar - The Rationale of Powertype-based Metamodelling to Underpin Software Development Methodologies, in Volume 43;
  • Goodburn, Daniel - Rapid Assembly and Deployment of Domain Visualisation Solutions, in Volume 9;
  • Goodchild, Andrew - UML and XML Schema, in Volume 5;
  • Goode, Matthew - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29;
  • Goodwin, Robert - Flexible Learning - Maximising Flexibility in a Subject with Large Student Numbers, in Volume 30;
  • Goodwin, Scott D. - Code Improvements for Model Elimination Based Reasoning Systems, in Volume 26; - Improving Search in a Hypothetical Reasoning System, in Volume 16;
  • Goold, Annegret - Facilitating Global Computing Education Through Study Abroad and Collaborative Projects, in Volume 52;
  • Gopalan, Raj P. - A Bottom-Up Projection Based Algorithm for Mining High Utility Itemsets, in Volume 84; - CT-ITL : Efficient Frequent Item Set Mining Using a Compressed Prefix Tree with Pattern Growth, in Volume 17;
  • Gor, Ajay S. - Optimal Joint Vendor-Buyer Inventory Strategy for Deteriorating Items with Salvage Value, in Volume 77;
  • Gorantla, M. Choudary - ID-based One-pass Authenticated Key Establishment, in Volume 81; - Strong Designated Verifier Signature in a Multi-user Setting, in Volume 98;
  • Gordon, Donald - Clicki: A Framework for Light-weight Web-based Visual Applications, in Volume 40;
  • Gore, Rajeev - Termination of Abstract Reduction Systems, in Volume 65;
  • Gorman, Malcolm - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26;
  • Gorton, Ian - Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
  • Goscinski, Andrzej - Autonomic System Management in Mobile Grid Environments, in Volume 68; - Service Migration in Autonomic Service Oriented Grids, in Volume 82; - State Aware WSDL, in Volume 82;
  • Gotterbarn, Don - Using SoDIS as a Risk Analysis Process: A Teaching Perspective, in Volume 30;
  • Gough, John - Compiling Ruby on the CLR, in Volume 74;
  • Governatori, Guido - A Model of Dynamic Resource Allocation in Workflow Systems, in Volume 27; - An algorithm for the induction of defeasible logic theories from databases, in Volume 17; - An Optimization for Query Answering on ALC Database, in Volume 49; - Handling of Current Time in Native XML Databases, in Volume 49; - Process Modelling: The Deontic Way, in Volume 53; - Representing and Reasoning on XForms Document, in Volume 27; - Using a Temporal Constraint Network for Business Process Execution, in Volume 49;
  • Goyette, Shea - Visualising Internet Traffic Data with Three-Dimensional Spherical Display, in Volume 45;
  • Graham, Hamish - A Solar System Metaphor for 3D Visualisation of Object Oriented Software Metrics, in Volume 35;
  • Graham, Malcolm - Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models, in Volume 16;
  • Graham, Stephen C. - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19;
  • Grainger, Ryan - Organisational Factors Affecting Teachers' Use and Perception of Information & Communications Technology, in Volume 46;
  • Grandell, Linda - Why Complicate Things? Introducing Programming in High School Using Python, in Volume 52;
  • Grannis, Shaun J. - Privacy-Preserving Distributed Queries for a Clinical Case Research Network, in Volume 14;
  • Grante, Christian - A Method and Tool Support for Model-based Semi-automated Failure Modes and Effects Analysis of Engineering Designs, in Volume 47;
  • Grasset, Raphael - Interactive Mediated Reality, in Volume 40;
  • Gray, Pamela N. - Intellectual Artefacts of Expert Systems Meta-epistemology, in Volume 37;
  • Gray, W.A. - Establishing an XML Metadata Knowledge Base to Assist Integration of Structured and Semi-structured Databases, in Volume 49;
  • Graydon, Patrick J. - Engineering, Communication, and Safety, in Volume 86;
  • Gready, Jill E. - Pathway to Functional Studies: Pipeline Linking Phylogenetic Footprinting and Transcription-Factor Binding Analysis, in Volume 73;
  • Greber, Myles - This Course Has A Bloom Rating Of 3.9, in Volume 30;
  • Green, Richard - Evaluating Swiftpoint as a Mobile Device for Direct Manipulation Input, in Volume 64;
  • Greenberg, Saul - Display and Presence Disparity in Mixed Presence Groupware, in Volume 28; - Enhancing Creativity with (Groupware) Toolkits, in Volume 28; - Rapidly Prototyping Single Display Groupware through the SDGToolkit, in Volume 28;
  • Greenfield, Paul - Transactions in Loosely Coupled Distributed Systems, in Volume 17;
  • Greening, Tony - Integrating Ethical Content Into Computing Curricula, in Volume 30;
  • Gregersen, Heidi - The Formal Semantics of the TimeER Model, in Volume 53;
  • Grenon, Pierre - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
  • Gribble, Susan J. - Engaging Undergraduates in Discussions about Ethics in Computing, in Volume 66; - The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
  • Grieshaber, Susan - New Basics Pedagogies that Promote Multiliteracies , in Volume 34; - Teachers Rethinking Curriculum Approaches within a New Basics Framework , in Volume 34;
  • Griffiths, Alena - A Product-Based Assurance Model for Mixed-Integrity Markets, in Volume 15; - Guidance for Def (Aust) 5679 Issue 2, in Volume 100; - On proof-test intervals for safety functions implemented in software, in Volume 69; - Systems Assurance for the Integrated Control and Communications System for KCRC East Rail Extensions, in Volume 15;
  • Grigg, Mark - Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom, in Volume 21;
  • Grimsmo, Nils - Faster Path Indexes for Search in XML Data, in Volume 75;
  • Gromiha, Michael M. - Structure-Function Relationship in DNA Sequence Recognition by Transcription Factors, in Volume 29;
  • Grossmann, Georg - Exploiting Semantics of Inter-Process Dependencies to Instantiate Predefined Integration Patterns, in Volume 83; - Modelling Inter-Process Dependencies with High-Level Business Process Modelling Languages, in Volume 79; - On the Road to Behavior-Based Integration, in Volume 31;
  • Grove, Duncan - PULSE: a Pluggable User-space Linux Security Environment paper, in Volume 81;
  • Grove, Duncan A. - Communication Performance Issues for Two Cluster Computers, in Volume 16;
  • Groves, Lindsay - Verifying Michael and Scott's Lock-Free Queue Algorithm using Trace Reduction, in Volume 77;
  • Gruba, Paul - Making Connections: First Year Transition for Computer Science and Software Engineering Students, in Volume 42; - Strategies for Communication Skills Development, in Volume 30; - What Drives Curriculum Change?, in Volume 30;
  • Gruhn, Volker - Development of an Electronic Commerce Portal System using a Specific Software Development Process, in Volume 10;
  • Grun, Katharina - Multi-Level Domain Modeling with M-Objects and M-Relationships, in Volume 96;
  • Grundeman, Peter - Extending a Persistent Object Framework to Enhance Enterprise Application Server Performance, in Volume 5;
  • Grundy, John - A Visual Language and Environment for Specifying User Interface Event Handling in Design Tools, in Volume 64; - An environment for developing adaptive, multi-device user interfaces, in Volume 18; - Beautifying Sketching-based Design Tool Content: Issues and Experiences, in Volume 40; - Building Multi-Device, Component-based, Thin-client Groupware: Issues and Experiences, in Volume 7; - Design Pattern Modelling and Instantiation using DPML, in Volume 10; - Extending a Persistent Object Framework to Enhance Enterprise Application Server Performance, in Volume 5; - Generating mobile device user interfaces for diagram-based modelling tools, in Volume 50; - Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
  • Gu, Zhixiong - A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters, in Volume 44;
  • Gudmundsson, Joachim - An ILP for the metro-line crossing problem, in Volume 77; - Increasing the Readability of Graph Drawings with Centrality-Based Scaling, in Volume 60;
  • Guillaume, Sylvie - Visualization of Attractive and Repulsive Zones Between Variables, in Volume 61;
  • Gunes, Hatice - Face and Body Gesture Recognition for a Vision-Based Multimodal Analyzer, in Volume 36; - Observer Annotation of Affective Display and Evaluation of Expressivity: Face vs. Face-and-Body, in Volume 56;
  • Gunji, Yukio-Pegio - Observational Heterarchy as Phenomenal Computing, in Volume 37;
  • Gunstone, Dick - An Exploration of Internal Factors Influencing Student Learning of Programming, in Volume 95;
  • Gunther, Oliver - Privacy Conflicts in CRM Services for Online Shops: A Case Study, in Volume 14;
  • Guo, Jian - A Novel Method for Protein Subcellular Localization Based on Boosting and Probabilistic Neural Network, in Volume 29;
  • Guo, Zhijuan - SPECT Image Data Compression Using Optimal Sampling Schedule, in Volume 22;
  • Gupta, Arvind - Minimum Cost Homomorphism to Oriented Cycles with Some Loops, in Volume 94;
  • Gurd, Bruce - GP Attitudes towards Using HI Systems in Their Professional Role, in Volume 97;
  • Gurrutxaga, Ibai - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87; - Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
  • Guzdial, Mark - Contextualized Computing Education of Programming, in Volume 95;
  • Gwynne, David - Grid services for e-archaeology, in Volume 82;
Top of List

H

  • Haaksma-Oostijen, T.G. - ICT and the New Roles of the Teacher in Dutch Secondary Education, in Volume 23;
  • Haden, Patricia - My Program is Correct But it Doesn't Run: A Preliminary Investigation of Novice Programmers' Problems, in Volume 42; - Parson's Programming Puzzles: A Fun and Effective Learning Tool for First Programming Courses, in Volume 52; - Problem Distributions in a CS1 Course, in Volume 52; - The ability to articulate strategy as a predictor of programming skill, in Volume 52; - The Incredible Rainbow Spitting Chicken: Teaching Traditional Programming Skills Through Games Programming, in Volume 52;
  • Hadzic, Maja - Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling, in Volume 79;
  • Haeusler, Edward Hermann - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85; - Semantic Interoperability via Category Theory, in Volume 83;
  • Hafen, Gaudenz - A Classification Algorithm that Derives Weighted Sum Scores for Insight into Disease, in Volume 97;
  • Hafenrichter, Bernd - Optimization of Relational Preference Queries, in Volume 39;
  • Hagan, Dianne - Employer Satisfaction with ICT graduates, in Volume 30;
  • Hagemann, Stephan - ActiveTags: Making Tags More Useful Anywhere on the Web, in Volume 92;
  • Hagen, Richard A. - Code Improvements for Model Elimination Based Reasoning Systems, in Volume 26; - Improving Search in a Hypothetical Reasoning System, in Volume 16;
  • Hagenbuchner, Markus - A ConceptLink Graph for Text Structure Mining, in Volume 91;
  • Hagenus, Kim - Adaptive Learning Environments for CS Education : From AMLE to Live Spaces, in Volume 20;
  • Haggard, Gary - Edge-Selection Heuristics for Computing Tutte Polynomials, in Volume 94;
  • Haider, Sajjad - Synthesizing Executable Models of Object Oriented Architectures, in Volume 12;
  • Hajmoosaei, Abdolreza - An ontology-based approach for resolving semantic schema conflicts in the extraction and integration of query-based information from heterogeneous web data sources, in Volume 85;
  • Halabi, Abdel K. - Designing Better CBL than Face-to-Face Tutoring by Incorporating Teacher-like Feedback and Guidance in Accounting, in Volume 8;
  • Hale, Allison - Teachers Rethinking Curriculum Approaches within a New Basics Framework , in Volume 34;
  • Haley, David - Calculating Train Braking Distance, in Volume 3;
  • Haley, Debra T. - Measuring Improvement in Latent Semantic Analysis-Based Marking Systems: Using a Computer to Mark Questions about HTML, in Volume 66;
  • Halim, Farris J. - View Synthesis by Image Mapping and Interpolation, in Volume 11;
  • Hall, R. - A Rapid Method of Whole Genome Visualisation Illustrating Features in Both Coding and Non-coding Regions, in Volume 29;
  • Hall, Robin - Learning and Online Knowledge Use, in Volume 8;
  • Hallinan, Jennifer - Evolving Genetic Regulatory Networks Using an Artificial Genome, in Volume 29;
  • Hamadi, Rachid - A Petri Net-based Model for Web Service Composition, in Volume 17; - Dynamic Restructuring of Recovery Nets, in Volume 39;
  • Hamer, John - A Maturity Model for Computing Education, in Volume 66; - A Method of Automatic Grade Calibration in Peer Assessment, in Volume 42; - Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52; - Peer Assessment Using Aropa, in Volume 66; - The PeerWise system of student contributed assessment questions, in Volume 78; - Visualising Java Data Structures as Graphs, in Volume 30;
  • Hamey, Leonard G.C. - Teaching Secure Data Communications Using a Game Representation, in Volume 20;
  • Hamidjadja, Herry - A CORBA Cooperative Cache Approach with Popularity Admission and Routing Mechanism, in Volume 5;
  • Hamilton, Margaret - A Taxonomic Study of Novice Programming Summative Assessment, in Volume 95; - Experiences in Teaching Computing Theory via Aspects of Problem-based Learning, in Volume 20; - Learning about Software Development - Should Programming Always Come First?, in Volume 30; - Mobile Computing, Programming, Games and Online Communities: Changes to the Communicative Ecology of Design Students Through Mobile Computing: Part 2, in Volume 66; - Mobile Computing, Visual Diaries, Learning and Communication: Changes to the Communicative Ecology of Design Students Through Mobile Computing, in Volume 52; - Software Development Marketplaces - Implications for Plagiarism, in Volume 66; - Transforming learning of programming: a mentoring project, in Volume 78;
  • Hamilton, N. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
  • Hamilton, Viv - A New Concept in Defence Safety Standards: The Revised UK Defence Standard 00-56, in Volume 55;
  • Hamoy, Christian - HazLog: Tool Support for Hazard Management, in Volume 47;
  • Han, Bing - Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels, in Volume 26; - On Defining the Service Provided by TCP, in Volume 16; - Validating TCP Connection Management, in Volume 12;
  • Han, Christina C.W. - Challenges of Using ICT in Hong Kong Early Childhood Settings, in Volume 34;
  • Han, Seungchul - Schemes of Storing XML Query Cache, in Volume 39;
  • Hannah, Robert - Observations of Student Competency in a CS1 Course, in Volume 42;
  • Hansaki, Tomoyuki - FindFlow: Visual Interface for Information Search based on Intermediate Results, in Volume 60;
  • Hansen, Klaus Marius - Dynamic Design and Evaluation of Software Architecture in Critical Systems Development, in Volume 69;
  • Hanson, K. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
  • Hao, Guoshun - An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries, in Volume 83;
  • Hao, Yanan - A Two-Phase Rule Generation and Optimization Approach for Wrapper Generation, in Volume 49; - Web Services Discovery Based On Schema Matching, in Volume 62;
  • Hara, Takahiro - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
  • Harder, Uli - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
  • Hardt, Marcus - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54;
  • Hardy, Dianna L. - YourSRB: A cross platform interface for SRB and Digital Libraries, in Volume 68;
  • Harfield, Anthony - Contextualising information and communications technology in developing countries, in Volume 88;
  • Haris, Parvez I. - Empirical Knowledge and Genetic Algorithms for Selection of Amide I Frequencies in Protein Secondary Structure Prediction, in Volume 29;
  • Harland, James - Analysis of Busy Beaver Machines via Induction Proofs, in Volume 65; - Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids, in Volume 4; - Evaluating the dynamic behaviour of Python applications, in Volume 91; - Experiences in Teaching Computing Theory via Aspects of Problem-based Learning, in Volume 20; - Planning with Time Limits in BDI Agent Programming Languages, in Volume 65; - Representation and Reasoning for Goals in BDI Agents, in Volume 4; - The Busy Beaver, the Placid Platypus and other Crazy Creatures, in Volume 51; - Transforming learning of programming: a mentoring project, in Volume 78;
  • Harper, Barry - Constructing High Quality Learning Settings, in Volume 42;
  • Harris, Eric - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
  • Harris, Michael C. - Software Development Marketplaces - Implications for Plagiarism, in Volume 66;
  • Harris, Pauline - Child's Play: Computer Games, Theories of Play and Children's Development, in Volume 34;
  • Harrison, Cathie - The Introduction of New Technologies - New Possibilities, Partnerships and Power Relationships , in Volume 34;
  • Hartel, Rita - CSC: Supporting Queries on Compressed Cached XML, in Volume 92;
  • Hartmann, Sven - Constraint Acquisition - You Can Chase but You Cannot Find, in Volume 79; - English Sentence Structures and EER Modeling, in Volume 67; - Horn Clauses and Functional Dependencies in Complex-value Databases, in Volume 49; - Normalisation in the Presence of Lists, in Volume 27; - On Inferences of Full Hierarchical Dependencies, in Volume 62; - Reasoning about participation constraints and Chen's constraints, in Volume 17;
  • Hartnell-Young, Elizabeth - From Facilitator to Knowledge-Builder : A New Role for the Teacher of the Future, in Volume 23;
  • Hartnett, Jacky - An online tool for learning collaboration and learning while collaborating., in Volume 52; - Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists, in Volume 54;
  • Hasan, Syed - Supporting Large Scale eResearch Infrastructures with Adapted Live Streaming Capabilities, in Volume 82;
  • Hasegawa, Ryo - Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling, in Volume 96;
  • Hashemi-Sakhtsari, Ahmad - Speech-to-Text Transcription in Support of Pervasive Computing, in Volume 25;
  • Hashimoto, S. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
  • Hasunuma, Toro - Multilayer Grid Embeddings of Iterated Line Digraphs, in Volume 51;
  • Hathaway, Richard J. - Approximate Data Mining in Very Large Relational Data, in Volume 49;
  • Hauer, Amie - A learning theory perspective on running open ended group projects (OEGPs), in Volume 78;
  • Haugvaldstad, Erik - Moving animation script creation from textual to visual representation, in Volume 50;
  • Hausser, Roland - Modeling Natural Language Communication in Database Semantics, in Volume 96;
  • Haverkorty, Herman - Computing a Minimum-Dilation Spanning Tree is NP-hard, in Volume 65;
  • Hawick, K.A. - Bootstrapping Computer Science in Old North Wales, in Volume 20; - Middleware for Context Sensitive Mobile Applications, in Volume 21; - Teaching Students How to be Computer Scientists Through Student Projects, in Volume 42;
  • Hawick, K.A. - Simulating a Computational Grid with Networked Animat Agents, in Volume 54;
  • Hawick, Ken A. - A Small-World Network Model for Distributed Storage of Semantic Metadata, in Volume 99;
  • Hawking, David - Automated Discovery of Search Interfaces on the Web, in Volume 17; - Challenges in Enterprise Search, in Volume 27; - How Valuable is External Link Evidence When Searching Enterprise Webs?, in Volume 27; - Performance and Cost Tradeoffs in Web Search, in Volume 27;
  • Hawkins, John - Comparing SVM Sequence Kernels: A Subcellular Localization Theme, in Volume 73; - Multi-stage Redundancy Reduction: Effective Utilisation of Small Protein Datasets, in Volume 73;
  • Hawkins, Richard - A Contract-based Approach to Designing Safe Systems, in Volume 33;
  • Hawley, Simon - On pedagogically sound examples in public-key cryptography, in Volume 48;
  • Hawryszkiewycz, I.T. - A Framework for Integrating Learning into Business Processes, in Volume 46;
  • Hawryszkiewycz, Igor - The Impact on the Changing Business Process Spectrum on Conceptual Modeling, in Volume 67;
  • Hay, Brian - Trust Requirements in Identity Management, in Volume 44;
  • Hayashi, Yukio - Spatial analysis of centralization and decentralization in the population migration network, in Volume 60;
  • Hayes, I. - Translating Refined Logic Programs to Mercury, in Volume 4;
  • Hayes, Ian - Integration of generic program analysis tools into a software development environment, in Volume 38;
  • Hayward, Ross - Trust Network Analysis with Subjective Logic, in Volume 48;
  • Haywood, Liz - Learning about Software Development - Should Programming Always Come First?, in Volume 30; - Programming students need instant feedback!, in Volume 20;
  • He, Charles - Tamper-proofing Software Watermarks, in Volume 32;
  • He, Hongxing - A Delivery Framework for Health Data Mining and Analytics, in Volume 38; - Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
  • He, Jing - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
  • He, Q. - Rule Sets Based Bilevel Decision Model, in Volume 48;
  • He, Sean Xiangjian - Edge Detection Based on Modified BP Algorithm of ANN, in Volume 36; - Multi-Scale Edge Detection with Bilateral Filtering in Spiral Architecture, in Volume 36;
  • He, Xiangjian - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38; - Image Segmentation on Spiral Architecture, in Volume 11;
  • Heckenberg, Stewart G. - Visualisation of the Minority Game Using a Mod, in Volume 35;
  • Hegazy, Nadia - A Study of Local and Global Thresholding Techniques in Text Categorization, in Volume 61;
  • Heinlein, Christian - Support for Subtyping and Code Re-use in Timor, in Volume 10;
  • Heinz, Steffen - Performance of Data Structures for Small Sets of Strings, in Volume 4;
  • Heiser, Gernot - A Resource Management Framework for Priority-Based Physical-Memory Allocation, in Volume 6;
  • Heitmeyer, Constance - Developing Safety-Critical Systems: The Role of Formal Methods and Tools, in Volume 55;
  • Hemer, David - A Formal Approach to Component Adaptation and Composition, in Volume 38; - HazLog: Tool Support for Hazard Management, in Volume 47; - Plug-in Proof Support for Formal Development Environments, in Volume 41; - Supporting Component-Based Reuse in CARE, in Volume 4; - Translating Refined Logic Programs to Mercury, in Volume 4;
  • Henderson-Sellers, Brian - The Rationale of Powertype-based Metamodelling to Underpin Software Development Methodologies, in Volume 43;
  • Henricksen, Matt - Algebraic Analysis of LEX, in Volume 98; - Securing Grid Data Using Mandatory Access Controls, in Volume 68;
  • Henshall, Kevin - Boolean Affine Approximation with Binary Decision Diagrams, in Volume 94;
  • Hepp, Pedro - Improving Literacy and Numeracy in Poor Schools: The Main Challenge in Developing Countries, in Volume 34;
  • Heravizadeh, Mitra - Making Workflows Context-aware: A Way to Support Knowledge-intensive Tasks, in Volume 79;
  • Herbert, Nicole - Quantitative Peer Assessment: Can students be objective?, in Volume 66; - Student timesheets can aid in curriculum coordination, in Volume 66;
  • Herbert, Ric D. - A Grid Resource Allocation Mechanism for Heterogeneous E-waste Computers, in Volume 99; - Visualisation of the Minority Game Using a Mod, in Volume 35;
  • Hering, Joachim A. - Empirical Knowledge and Genetic Algorithms for Selection of Amide I Frequencies in Protein Secondary Structure Prediction, in Volume 29;
  • Herlihy, Brian - Boolean equation solving as graph traversal, in Volume 51;
  • Hersh, William - Do Clarity Scores for Queries Correlate with User Performance?, in Volume 27;
  • Hesketh, Alan - Making 12,000 Healthcare Organisations Interoperate, and Other Challenges, in Volume 97;
  • Hess, William - Principles for Modelling of a Dose Form Vocabulary, in Volume 58;
  • Heuser, Carlos A. - SimEval - A Tool for Evaluating the Quality of Similarity Functions, in Volume 83;
  • Hew, Patrick Chisan - Visualisation of Surveillance Coverage by Latency Mapping, in Volume 24;
  • Hexel, Rene - 'Powerpoint to the People' : Suiting the Word to the Audience, in Volume 28; - FITS - A Fault Injection Architecture for Time-Triggered Systems, in Volume 16;
  • Heyer, Clint - Ambient Interaction Framework - Software Infrastructure for the Rapid Development of Pervasive Computing Environments, in Volume 25;
  • Hidders, Jan - Conflict Scheduling of Transactions on XML Documents, in Volume 27; - Peer-to-Peer Form Based Web Information Systems, in Volume 49; - When are two Workflows the Same?, in Volume 41;
  • Hidehiko, Tanaka - Proposal for Effective Information Flow Control Model for Sharing and Protecting Sensitive Information, in Volume 98;
  • Hideshima, Yusuke - STARMINE : A Visualization System for Cyber Attacks, in Volume 60;
  • Hiew, Hong Liang - Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources, in Volume 44;
  • Higgins, Chris - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
  • Higgins, Phillip - Intelligent Visualisation of Social Network Analysis Data, in Volume 2;
  • Hilderman, Robert - A Characterization of Wordnet Features in Boolean Models For Text Classification, in Volume 61; - Categorical Proportional Difference: A Feature Selection Method for Text Categorization, in Volume 87;
  • Hilker, Michael - Description of Bad-Signatures for Network Intrusion Detection, in Volume 54;
  • Hill, Michael J. - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
  • Hillenbrand, Stephen Peter - Developing a Location Based Tourist Guide Application, in Volume 21;
  • Hinchey, Michael G. - Confessions of a Formal Methodist, in Volume 15;
  • Hine, John H. - Auction Based Resource Negotiation in NOMAD, in Volume 38; - Securing Distributed Computing Against the Hostile Host, in Volume 26;
  • Hingston, Philip F. - A Dynamic Communication Algorithm for Digital Halftoning, in Volume 4; - Using Finite State Automata for Sequence Mining, in Volume 4;
  • Hintz, Tom - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38; - Image Segmentation on Spiral Architecture, in Volume 11;
  • Hinze, Annika - Approximative Filtering of XML Documents in Publish/Subscribe Systems, in Volume 48; - Event-based Communication for Location-based Service Collaboration, in Volume 92; - Interaction Design for a Mobile Context-Aware System using Discrete Event Modelling, in Volume 48; - Pruning Subscriptions in Distributed Publish/Subscribe Systems, in Volume 48; - The Challenge of Creating Cooperating Mobile Services: Experiences and Lessons Learned, in Volume 48;
  • Hiremath, P. S. - Extraction of Flat and Nested Data Records from Web Pages, in Volume 61;
  • Hisil, Huseyin - Faster Group Operations on Elliptic Curves, in Volume 98;
  • Hitchens, Michael - A Focus Group Study of Student Attitudes to Lectures, in Volume 95;
  • Ho-Stuart, Chris - Developing and Delivering a Software Internationalisation Subject, in Volume 32; - Key Challenges in Software Internationalisation, in Volume 32;
  • Ho, TuBao - Knowledge Visualization in Hepatitis Study, in Volume 60;
  • Ho, Van - A BDI Agent Architecture for Dialogue Modelling and Coordination in a Smart Personal Assistant, in Volume 57;
  • Hoad, Timothy C. - Video Similarity Detection for Digital Rights Management, in Volume 16;
  • Hoang, Doan B. - A Simulation Study of Using ER Feedback Control to Transport Compressed Video over ATM Networks, in Volume 2;
  • Hoang, Thuong N. - Augmenting Image Place AR 3D Interactions for Wearable Computers, in Volume 93;
  • Hobbs, Vaughan - A Unified Taxonomic Framework for Information Visualization, in Volume 24;
  • Hoehn, Gerald - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
  • Hoffman, Mark E. - The Case for More Digital Logic in Computer Architecture, in Volume 30;
  • Hoffmann, Jan - Frequency Space Representation of Transitions of Quadruped Robot Gaits, in Volume 26;
  • Hofinger, Thomas - A Component-Based Application Framework for Manufacturing Execution Systems in C# and .NET, in Volume 10;
  • Hofstede, Arthur H.M. ter - When are two Workflows the Same?, in Volume 41;
  • Hogan, James M. - Bacterial Promoter Modeling and Prediction for E. Coli and B. Subtilis with Beagle, in Volume 73; - Developing and Delivering a Software Internationalisation Subject, in Volume 32; - Developing the Software Engineering Team, in Volume 42; - Key Challenges in Software Internationalisation, in Volume 32; - Tight Spirals and Industry Clients: The Modern SE Education Experience, in Volume 42;
  • Hogg, K. - An Evaluation of Web Services in the Design of a B2B Application, in Volume 26;
  • Hogg, Richard - ICT Education - The Challenge for the Future, in Volume 23;
  • Holford, John W. - Using Self-Defending Objects to Develop Security Aware Applications in Java, in Volume 26;
  • Holkner, Alex - Evaluating the dynamic behaviour of Python applications, in Volume 91;
  • Holkner, Bernard - Four Platforms : Moral perspectives on Information Technology, in Volume 23;
  • Holmberg, Nathan - A Framework for InteractiveWeb-Based Visualization, in Volume 50;
  • Holt, Jason E. - Logcrypt: Forward Security and Public Verification for Secure Audit Logs, in Volume 54;
  • Holvoet, Tom - A Tool for Component Based Design of Embedded Software, in Volume 10;
  • Homola, Martin - Towards Distributed Tableaux Reasoning Procedure for DDL with Increased Subsumption Propagation between Remote Ontologies, in Volume 90;
  • Hong, Hai - Novel Elastic Registration for 2-D Medical and Gel Protein Images, in Volume 19;
  • Hong, Seok-Hee - How People Read Sociograms: A Questionnaire Study, in Volume 60; - Layered Drawings of Directed Graphs in Three Dimensions, in Volume 45; - Predicting Graph Reading Performance: A Cognitive Approach, in Volume 60; - Puzzle Generators and Symmetric Puzzle Layout, in Volume 45; - The Metro Map Layout Problem, in Volume 35; - Visual Analysis of Network Centralities, in Volume 60; - Visualisation of Symmetry in Graphs, in Volume 2;
  • Hongladarom, Soraj - Exploring the Philosophical Terrain of the Digital Divide, in Volume 37;
  • Hongtao, Su - Face Recognition Using Multi-feature and Radial Basis Function Network, in Volume 22;
  • Honnappa, Harsha - Customer Event Rate Estimation Using Particle Filters, in Volume 87;
  • Hooijmaijers, Dennis - Enhancing Subjective Ontologies with Social Tagging Systems, in Volume 90; - Trust Based Ontology Integration For The Community Services Sector, in Volume 72;
  • Hope, Lucas - Layout of Bayesian Networks, in Volume 38;
  • Hope, Lucas R. - Take Heart II: A Modular Bayesian Decision Support System, in Volume 68;
  • Hopkins, Josie L. - Constructionist Learning and Teaching in a Computer Clubhouse Environment, in Volume 23; - Psycles of Change: Development and Implementation of Databased Curriculum Documentation, in Volume 8;
  • Hoppenbrouwers, S.J.B.A. - On Utility-based Selection of Architecture-Modelling Concepts, in Volume 43;
  • Hornsby, Kathleen - A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values, in Volume 16;
  • Horta, Ain Y. de - VELNET (Virtual Environment for Learning Networking), in Volume 30;
  • Hoskens, Ian - Multi-sensory Game Interface Improves Player Satisfaction but not Performance, in Volume 76;
  • Hosking, John - A Visual Language and Environment for Specifying User Interface Event Handling in Design Tools, in Volume 64; - Building Multi-Device, Component-based, Thin-client Groupware: Issues and Experiences, in Volume 7; - Design Pattern Modelling and Instantiation using DPML, in Volume 10; - Generating mobile device user interfaces for diagram-based modelling tools, in Volume 50; - Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
  • Hosobe, Hiroshi - An Extended High-Dimensional Method for Interactive Graph Drawing, in Volume 45;
  • Hosono, Chiharu - The Relative Completeness of a Version of CTL*, in Volume 41;
  • Hou, Jingyu - Utilizing Hyperlink Transitivity to Improve Web Page Clustering, in Volume 17;
  • Hou, Jinyu - Constructing Good Quality Web Page Communities, in Volume 5;
  • Houben, Geert-Jan - XAL: An Algebra For XML Query Optimization, in Volume 5;
  • Hoy, Jason E. Sew - BRINet: A BioResource Integration Network, in Volume 29;
  • Hsieh, Bin-Tsan - On the Security of Some Proxy Blind Signatures Schemes, in Volume 32;
  • Hsieh, Min-Sheng (Peter) - Supporting Software Reuse by the Individual Programmer, in Volume 48;
  • Hsu, Ming-Fa - A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments, in Volume 38;
  • Hsu, Tz-Heng - A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments, in Volume 38;
  • Hsu, W. J. - Embedding of Fault-Tolerant Trees in the Josephus Cube, in Volume 6;
  • Hsueh, Sue-Chen - Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream, in Volume 75;
  • Hu, Hong - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61; - A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73; - Using Association Rules to Make Rule-based Classifiers Robust, in Volume 39;
  • Hu, Jing - Diagonal Ordering: A New Approach to High-Dimensional KNN Processing, in Volume 27;
  • Hu, Junquan - A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters, in Volume 44;
  • Hu, Minjie - Bloom's Taxonomy for CS assessment, in Volume 78;
  • Hu, Qimei - Multi-Scale Edge Detection with Bilateral Filtering in Spiral Architecture, in Volume 36;
  • Hu, Xiaohua - Classification Comparison of Prediction of Solvent Accessibility From Protein Sequences, in Volume 29; - Cluster Ensemble and Its Applications in Gene Expression Analysis, in Volume 29;
  • Huang, Chung-Ming - A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments, in Volume 38;
  • Huang, F.Y. - Programming with Heterogeneous Structures: Manipulating XML data Using bondi, in Volume 48;
  • Huang, Fuchun - Breast Cancer Survivability via AdaBoost Algorithms, in Volume 80;
  • Huang, Ing-Jer - Analysis of Hardware and Software Approaches to Embedded In-Circuit Emulation of Microprocessors, in Volume 6;
  • Huang, Jiwu - A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters, in Volume 44;
  • Huang, Kai - Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges, in Volume 11;
  • Huang, Lianen - From WebArchive to WebDigest : Concept and Examples, in Volume 75;
  • Huang, Mao Lin - Improvements of Space-Optimized Tree for Visualizing and Manipulating Very Large Hierarchies, in Volume 22; - Information Visualization of Attributed Relational Data, in Volume 9; - Visualising File-Systems Using ENCCON Model, in Volume 36;
  • Huang, Sung-Cheng - A Statistical Method for Assessment of 3-D Medical Image Registration, in Volume 2;
  • Huang, Weidong - How People Read Graphs, in Volume 45; - How People Read Sociograms: A Questionnaire Study, in Volume 60; - Predicting Graph Reading Performance: A Cognitive Approach, in Volume 60;
  • Huang, Xiaodi - A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization, in Volume 38; - Force-Transfer : A New Approach to Removing Overlapping Nodes in Graph Layout, in Volume 16; - On the Structural Algorithm of Filtering Graphs for Layout, in Volume 36; - Pattern Puzzle: A Metaphor for Visualizing Software Complexity Measures, in Volume 60;
  • Huang, Xiaowei - Weak Parametric Failure Equivalences and Their Congruence Formats, in Volume 77;
  • Huang, Zhiyi - Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory, in Volume 26; - Supporting Large Scale eResearch Infrastructures with Adapted Live Streaming Capabilities, in Volume 82;
  • Huang, Zi - Dimensionality Reduction in Patch-Signature Based Protein Structure Matching, in Volume 49;
  • Hudaya, Anang - Commodity-Grid Based Distributed Pattern Recognition Framework, in Volume 82;
  • Huebner, Ewa - Computer forensics workshop for undergraduate students, in Volume 78;
  • Hugh, Thomas - 3D Visualisation of Tumours and Blood Vessels in Human Liver, in Volume 22; - Semi-Automatic Feature Delineation In Medical Images, in Volume 35;
  • Hughes, Baden - Building Computational Grids with Apple's Xgrid Middleware, in Volume 54; - Making Connections: First Year Transition for Computer Science and Software Engineering Students, in Volume 42;
  • Hui, L.C.K. - Tuning the Collision Test for Power, in Volume 26;
  • Huisman, Marieke - Factorising Temporal Specifications, in Volume 41;
  • Hung, Patrick C.K. - A Secure Workflow Model, in Volume 21;
  • Hung, Regant Y. S. - An Optimal Broadcasting Protocol for Mobile Video-on-Demand, in Volume 65;
  • Hungerford, Stuart - Integrating The MACHO Data-set with the Virtual Observatory, in Volume 44;
  • Hunt, Fern - Using Markov Chain Analysis to Study Dynamic Behaviour in Large-Scale Grid Systems, in Volume 99;
  • Hunt, Lynn - Exploring Conceptions of programming, in Volume 52;
  • Hunter, Adam - Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources, in Volume 44;
  • Hunter, Bruce - Assuring Separation of Safety and Non-safety Related Systems, in Volume 69;
  • Hunter, Chris - Agent-Based Distributed Software Verification, in Volume 38;
  • Hunter, Jane - The Development, Evaluation and Application of Ontologies to eResearch, in Volume 85;
  • Hurst, A. J. - Performance and progression of first year ICT students, in Volume 78;
  • Hurst, John - An Exploration of Internal Factors Influencing Student Learning of Programming, in Volume 95;
  • Hurst, Nathan - Cobweb : A Constraint-Based WEB Browser, in Volume 16;
  • Husemann, Martin - Providing Semantically Equivalent, Complete Views for Multilingual Access to Integrated Data, in Volume 83;
  • Hussey, Andrew - Extending and Evaluating a Pattern Language for Safety-Critical User Interfaces, in Volume 3;
  • Huston, Samuel - The Core Concept for 0/1 Integer Programming, in Volume 77;
  • Hutchens, Ruston - Bandwidth Reservation Strategies for Mobility Support of Wireless Connections with QoS Guarantees, in Volume 4;
  • Hutchins, Matthew - A Collaborative Guidance Case Study, in Volume 76;
  • Hutterer, Peter - Enabling Co-located Ad-hoc Collaboration on Shared Displays, in Volume 76; - Groupware Support in the Windowing System, in Volume 64; - Lightweight User Interfaces for Watch Based Displays, in Volume 40; - TIDL: Mixed Presence Groupware Support for Legacy and Custom Applications, in Volume 50;
  • Huuck, Ralf - High Assurance System Software, in Volume 55;
  • Hvam, K. - Some Structural and Geometric Properties of Two-Connected Steiner Networks, in Volume 65;
  • Hwang, Gwan-Hwan - A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery, in Volume 63;
  • Hwang, Sheng-Kun - Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream, in Volume 75;
  • Hyvakka, Jouko - Implementing a Natural User Interface for Camera Phones Using Visual Tags, in Volume 50;
Top of List

I

  • Iga, Soichiro - SnapShoot: Integrating Semantic Analysis and Visualization Techniques for Web-based Note Taking System, in Volume 60;
  • Igaki, Hiroshi - Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
  • Ikeda, Katsuhiro - Generation of Relevance Maps and Navigation in A Digital Book, in Volume 60;
  • Ilyin, Valentin - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
  • Indrawan, Maria - A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios, in Volume 32;
  • Indulska, Jadwiga - Asad Pirzada, Ryan Wishart, Marius Portmann and Jadwiga Indulska, in Volume 91; - Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol, in Volume 62; - Location Management in Pervasive Systems, in Volume 21; - Quality of Service Support for Vertical Handovers in Pervasive Systems, in Volume 25; - SuperstringRep: Reputation-enhanced Service Discovery, in Volume 38;
  • Indulska, M. - On Aggregation Issues in Spatial Data Management, in Volume 5;
  • Indulska, Marta - Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis, in Volume 83;
  • Inenaga, Shunsuke - Testing Square-Freeness of Strings Compressed by Balanced Straight Line Program, in Volume 94;
  • Inniss, Gail - Teaching for Tomorrow - Integrating Learning Technologies into Early Years Professional Development , in Volume 34;
  • Innocent, Peter R. - Empirical Knowledge and Genetic Algorithms for Selection of Amide I Frequencies in Protein Secondary Structure Prediction, in Volume 29;
  • Inoue, Naomi - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
  • Irwin, Warwick - Informing the Design of Pipeline-Based Software Visualisations, in Volume 45; - Inhomogeneous Force-Directed Layout Algorithms in the Visualisation Pipeline: From Layouts to Visualisations, in Volume 35; - Visualising Class Cohesion with Virtual Worlds, in Volume 24; - XML in the Visualisation Pipeline, in Volume 11;
  • Isal, R. Yugo Kartono - Enhanced Word-Based Block-Sorting Text Compression, in Volume 4;
  • Ishihara, Makio - Locating A Projector Using The Strength of Beams Reflected on a Screen, in Volume 64;
  • Ishihara, Masaki - Ripple Presentation for Tree Structures with Historical Information, in Volume 60;
  • Ishihara, Yukio - Locating A Projector Using The Strength of Beams Reflected on a Screen, in Volume 64;
  • Ishii, Toshimasa - Augmenting Edge-Connectivity between Vertex Subsets, in Volume 94; - Minimum Augmentation of Edge-Connectivity with Monotone Requirements in Undirected Graphs, in Volume 65; - Minimum Cost Source Location Problem with Local 3-Vertex-Connectivity Requirements, in Volume 41;
  • Ishikawa, Hiroshi - An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories, in Volume 39;
  • Ishikawa, Masahiro - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
  • Islam, Khandaker Shahidul - An Approach to Argumentation Context Mining from Dialogue History in an E-Market Scenario, in Volume 84; - An E-Market Framework to Determine the Strength of Business Relationships between Intelligent Agents, in Volume 70;
  • Islam, Md. Zahidul - A Framework for Privacy Preserving Data Mining, in Volume 32;
  • Islas Sedano, Carolina - Computer science students can help to solve problems of multiplayer mobile games, in Volume 88;
  • Itoh, Takayuki - Visualization of multi-dimensional data of bioactive chemicals using a hierarchical data visualization technique 'HeiankyoView', in Volume 60;
  • Itzstein, G. Stewart - Applications of Join Java, in Volume 6;
  • Ivins, Jim - Assessing the capability and maturity of capstone software engineering projects, in Volume 78; - Engaging Undergraduates in Discussions about Ethics in Computing, in Volume 66; - The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52; - Using PSP to Evaluate Student Effort in Achieving Learning - Outcomes in a Software Engineering Assignment, in Volume 42;
  • Ivkovic, Sasa - Applying Anatomical Therapeutic Chemical (ATC) and Critical Term Ontologies to Australian Drug Safety Data for Association Rules and Adverse Event Signalling, in Volume 58;
  • Iyengar, Vijay - Analytics for Audit and Business Controls in Corporate Travel and Entertainment, in Volume 70;
  • Izu, Cruz - Throughput fairness in k-ary n-cube networks., in Volume 48;
Top of List

J

  • Jaakkola, Hannu - Early Assessment of Classification Performance, in Volume 32;
  • Jackson, Kirk - Aspects to Visualising Reusable Components, in Volume 24; - Visualising Reusable Software Over The Web, in Volume 9; - XML Database Support for Program Trace Visualisation, in Volume 35;
  • Jackson, Margaret - The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights, in Volume 44;
  • Jacob, Verghese - 'When the Regulator Calls', in Volume 100;
  • Jacobs, Grant - Signals in mRNAs that Influence the Initiation of Translation, in Volume 19;
  • Jacobs, Timothy - Application of Focus + Context to UML, in Volume 24; - Bubbleworld : A New Visual Information Retreival Technique, in Volume 24;
  • Jaffar, Joxan - Constraint Logic Programming for Program Analysis, in Volume 74;
  • Jakob, Mihaly - flashWeb: Graphical Modeling of Web Applications for Data Management, in Volume 83;
  • Jakoniene, Vaida - Towards Transparent Access to Multiple Biological Databanks, in Volume 19;
  • James, C.J. - Teaching Students How to be Computer Scientists Through Student Projects, in Volume 42;
  • James, Geoff - Approaches for Semantic Interoperability between Domain Ontologies, in Volume 72;
  • James, H.A. - Bootstrapping Computer Science in Old North Wales, in Volume 20; - Middleware for Context Sensitive Mobile Applications, in Volume 21; - Simulating a Computational Grid with Networked Animat Agents, in Volume 54; - Teaching Students How to be Computer Scientists Through Student Projects, in Volume 42;
  • James, Julie - Principles for Modelling of a Dose Form Vocabulary, in Volume 58;
  • Jamieson, John - Regulation of Medical Devices involving Software in Australia - an Overview, in Volume 3;
  • Jamieson, Peter - A Studio-Based Approach to Teaching Information Technology, in Volume 8;
  • Jan, Tony - Face and Body Gesture Recognition for a Vision-Based Multimodal Analyzer, in Volume 36;
  • Janczura, Chris - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12;
  • Jang, Daniel - On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma, in Volume 26;
  • Jang, Julian - Transactions in Loosely Coupled Distributed Systems, in Volume 17;
  • Janneck, Jorn W. - Higher-Order Petri Net Modelling - Techniques and Applications, in Volume 12;
  • Jansamak, S. - Formalization of UML Statechart Models Using Concurrent Regular Expressions, in Volume 26;
  • Jansen, Klaus - On Packing Squares with Resource Augmentation: Maximizing the Profit, in Volume 41;
  • Jansson, Jesper - On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
  • Jarvinen, Hannu-Matti - CLIP, a Command Line InterPreter for a subset of C++, in Volume 88;
  • JasonSmith, Michael - Get a Way Back : Evaluating Retrieval from History Lists, in Volume 18;
  • Javadi, Bahman - Communication Network Analysis of the Enterprise Grid Systems, in Volume 68;
  • Jay, C. Barry - A Relational Account of Objects, in Volume 48; - Programming with Heterogeneous Structures: Manipulating XML data Using bondi, in Volume 48;
  • Jayasinghe, Malith - The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed Workloads, in Volume 91;
  • Jeacocke, David - Mining Medical Specialist Billing Patterns for Health Service Management, in Volume 87;
  • Jennings, Andrew - Towards Nanocomputer Architecture, in Volume 6;
  • Jennings, Phil - Towards an understanding of protein-protein interaction network heirarchies. Analysis of DnaN-binding peptide motifs in members of protein families interacting with the eubacterial processivity clamp, the subunit of DNA Polymerase III, in Volume 19;
  • Jensen, Claus - On the Power of Structural Violations in Priority Queues, in Volume 65;
  • Jeong, Byeong-Soo - ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns, in Volume 87;
  • Jeremic, Nikifor - Access Control Models and Security Labelling, in Volume 62;
  • Jesshope, Chris - Performance Evaluation on a Micro-threading Pipeline, in Volume 6;
  • Jiang, Haifeng - Path Materialization Revisited: An Efficient Storage Model for XML Data, in Volume 5;
  • Jiang, Ning - Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
  • Jiang, Tao - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
  • Jiang, Wen - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
  • Jianu, Radu - An Experimental Study on Algorithms for Drawing Binary Trees, in Volume 60;
  • Jiao, Li - Weak Parametric Failure Equivalences and Their Congruence Formats, in Volume 77;
  • Jin, Hai - A Min-Min Average Algorithm for Scheduling Transaction-Intensive Grid Workflows, in Volume 99;
  • Jin, Huidong - A Delivery Framework for Health Data Mining and Analytics, in Volume 38; - Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
  • Jin, Jesse J. - Web-based Multimedia GP Medical System, in Volume 36;
  • Jin, Jesse S. - 3D Reconstruction of a Human Face with Monocular Camera Based on Head Movement, in Volume 36; - A Confidence Based Recognition System for TV Commercial Extraction, in Volume 75; - A Quantitative Analysis for Decomposing Visual Signal of the Gaze Displacement, in Volume 11; - Automatic Extraction of Lung Boundaries by a Knowledge-Based Method, in Volume 2; - Cataloging and Search Engine for Video Library, in Volume 2; - Code Generation for Just-in-Time Compiled Mobile Collector Agents, in Volume 22; - Compressed Video Transmission over Digital Networks : Analysis and Design, in Volume 22; - Detection and Measurement of Hilar Region in Chest Radiograph, in Volume 22; - Detection of Abnormal Texture in Chest X-rays with Reduction of Ribs, in Volume 36; - Elastic Medical Image Registration Based on Image Intensity, in Volume 11; - Enhancing Screen Teleconferencing with Streaming SIMD Extensions, in Volume 11; - Home Photo Indexing using Learned Visual Keywords, in Volume 22; - Media Streaming Synchronisation and Video Interaction : A Survey, in Volume 22; - Modelling and Design of VAML, in Volume 11; - Multimedia Index and Retrieval Under MARC Framework, in Volume 22; - Object Tracking Using CamShift Algorithm and Multiple Quantized Feature Spaces, in Volume 36; - Principles of Video Annotation Markup Language (VAML), in Volume 36; - Relevance Feedback for Content-Based Image Retrieval Using Bayesian Network, in Volume 36; - Robust Real-Time Tracking of Non-Rigid Objects, in Volume 36; - Screen Capture - A Vector Quantisation Approach, in Volume 36; - Segmentation-Based Multilayer Diagnosis Lossless Medical Image compression, in Volume 36; - Shape Similarity Search Using XML and Portal Technology, in Volume 36; - Texture Classification using Multi-Scale Scheme, in Volume 36; - The Development of a Video Metadata Authoring and Browsing System in XML, in Volume 2; - The Development of an Online Video Browing System, in Volume 11; - Unseeded Region Growing for 3D Image Segmentation, in Volume 2; - Using Dual Cascading Learning Frameworks for Image Indexing, in Volume 36; - Video Cataloguing and Browsing, in Volume 11; - View Synthesis by Image Mapping and Interpolation, in Volume 11; - Visual Representation Model for Motion Direction Selectivity, in Volume 22;
  • Jin, Yan - Lightweight Consistency Analysis of Dataflow Process Networks, in Volume 16;
  • Jittrawong, Keerati - Optimizing XPath Queries on Streaming XML Data, in Volume 63;
  • John, Mathias - Conceptional Modeling and Analysis of Spatio-Temporal Processes in Biomolecular Systems, in Volume 96;
  • Johnson, C.W. - Location History in a Low-cost Context Awareness Environment, in Volume 21;
  • Johnson, Chris - 'Powerpoint to the People' : Suiting the Word to the Audience, in Volume 28;
  • Johnson, Chris R. - Biomedical Computing and Visualization, in Volume 48;
  • Johnson, Chris W. - Analysing the Causes of the Italian and Swiss Blackout, 28th September 2003, in Volume 86; - eScience Curricula at Two Australian Universities, in Volume 42; - Redesigning the Intermediate Course in Software Design, in Volume 42;
  • Johnson, Steven - e-Ghosts: Leaving Virtual Footprints in Ubiquitous Workspaces, in Volume 28;
  • Johnsten, Tom - A Methodology for Hiding Knowledge in Databases, in Volume 14;
  • Johnston, Benjamin - An algorithm for the induction of defeasible logic theories from databases, in Volume 17;
  • Johnston, Stanley - Economic development via the Net in Oceania, in Volume 1;
  • Johnston, W. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
  • Johnstone, Ron - Supporting Coral Reef Ecosystems Research through Modelling Re-usable Ontologies, in Volume 90;
  • Jones-Diaz, Criss - Multiple Literacies... Multiple Learning Opportunities , in Volume 34;
  • Jones-Lee, Michael - Eliciting Measures of Value for Health and Safety, in Volume 47;
  • Jones, Anthony J. - ICT and Future Teachers : Are We Prepared for E-Learning?, in Volume 23; - Infusing ICT Use within the Early Years of Elementary Education, in Volume 34; - Integration of ICT in an Initial Teacher Training Course: Participants' Views, in Volume 8;
  • Jones, Beverley D. - Commonsense ISD: An Empirical Approach to Teaching Systems Analysis and Design, in Volume 42;
  • Jones, Christian - Using Machinima to Promote Computer Science Study, in Volume 93;
  • Jones, Jeff - Creative Research and Development Collaborations, in Volume 40;
  • Jones, John - DVB-MHP/JavaTV Data Transport Mechanisms, in Volume 10;
  • Jorns, Oliver - A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services, in Volume 68;
  • Josang, Audun - A Method for Access Authorisation Through Delegation Networks, in Volume 54; - An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems, in Volume 81; - Belief Based Risk Analysis, in Volume 32; - Mesmerize - an Open Framework for Enterprise Security Management, in Volume 32; - Probabilistic Logic under Uncertainty, in Volume 65; - Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign, in Volume 81; - Security in Mobile Communications: Challenges and Opportunities, in Volume 21; - Semantic Constraints for Trust Transitivity, in Volume 43; - SuperstringRep: Reputation-enhanced Service Discovery, in Volume 38; - Trust Network Analysis with Subjective Logic, in Volume 48; - Trust Requirements in Identity Management, in Volume 44; - Usability and Privacy in Identity Management Architectures, in Volume 68; - User Interface Requirements for Authentication of Communication, in Volume 18;
  • Joshi, Ramesh C. - Finding Similarity in Time Series Data by Method of Time Weighted Moments, in Volume 39;
  • Joyce, Donald - Developing and Implementing a Professional Doctorate in Computing, in Volume 30;
  • Jung, Oliver - A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services, in Volume 68;
  • Jung, Seong Dae - Integrated Visualization for Geometry PIG Data, in Volume 60;
  • Jung, Soon Ki - Integrated Visualization for Geometry PIG Data, in Volume 60;
  • Jureta, Ivan J. - Clarifying Goal Models, in Volume 83;
Top of List

K

  • Kabir, Md Enamul - Conditional Purpose Based Access Control Model for Privacy Protection, in Volume 92;
  • Kaburagi, T. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
  • Kaila, Erkki - VILLE - a language-independent program visualization tool, in Volume 88;
  • Kaiser, Bernhard - A New Component Concept for Fault Trees, in Volume 33;
  • Kaiser, Fabian - flashWeb: Graphical Modeling of Web Applications for Data Management, in Volume 83;
  • Kaiser, Robin - Emotions in HCI - An Affective E-Learning System, in Volume 56;
  • Kaiya, Haruhiko - Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling, in Volume 96;
  • Kamble, Anand S. - A Conceptual Model for Multidimensional Data, in Volume 79;
  • Kamiura, Moto - Observational Heterarchy as Phenomenal Computing, in Volume 37;
  • Kamleh, Waseem - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
  • Kamp, Gerrit - Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis, in Volume 83;
  • Kanamori, Yoshinari - Performance Evaluation of Combining Data Migration and Method Migration in Object Database Environments, in Volume 5;
  • Kaneiwa, Ken - Logical Aspects of Events: Quantification, Sorts, Composition and Disjointness, in Volume 58;
  • Kang, Byeong Ho - Using Formal Concept Analysis with an Incremental Knowledge Acquisition System for Web Document Management, in Volume 48;
  • Kang, Hyunchul - Deferred Incremental Refresh of XML Materialized Views : Algorithms and Performance Evaluation, in Volume 17; - Schemes of Storing XML Query Cache, in Volume 39;
  • Kantarcioglu, Murat - An Architecture for Privacy-preserving Mining of Client Information, in Volume 14;
  • Kanzaki, Yuichiro - Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
  • Kao, Chung-Fu - Analysis of Hardware and Software Approaches to Embedded In-Circuit Emulation of Microprocessors, in Volume 6;
  • Kaplan, Simon M. - Identifying Salient Learning Experiences: A Scenario-Based Method Enabling Industry-University Partnerships in IT, in Volume 20;
  • Kaplan, Warren - Informative 3D Visualization of Multiple Protein Structures, in Volume 29;
  • Kapurubandara, Mahesha - Incorporating Business Requirements and Constraints in Database Conceptual Model, in Volume 31;
  • Karahasanovic, Amela - An Investigation into Keystroke Latency Metrics as an Indicator of Programming Performance, in Volume 42; - Difficulties experienced by students in maintaining object-oriented systems: an empirical study, in Volume 66;
  • Karimi, Mehdi - Minimum Cost Homomorphism to Oriented Cycles with Some Loops, in Volume 94;
  • Karlapalem, Kamalakar - A Methodology and Toolkit for Deploying Contract Documents as E-contracts, in Volume 83; - A Secure Workflow Model, in Volume 21; - Active Meta Modeling Support for Evolving E-contracts, in Volume 83; - View Relevance Driven Materialized View Selection in Data Warehousing Environment, in Volume 5;
  • Karunaratne, S. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
  • Karunaratne, Savant - A Fuzzy Rule-Based Interactive Methodology for Training Multimedia Actors, in Volume 2;
  • Kasabov, N. - A Generic Connectionist-Based Method for On-Line Feature Selection and Modelling with a Case Study of Gene Expression Data Analysis, in Volume 19;
  • Kasabov, Nikola - A Novel Feature Selection Method to Improve Classification of Gene Expression Data, in Volume 29;
  • Kaschek, Roland - An e-Process Selection Model, in Volume 83; - Context-Aware Web Information Systems, in Volume 31;
  • Kasmarik, Kathryn - Experimental Evaluation of a Program Visualisation Tool for Use in Computer Science Education, in Volume 24;
  • Kasprzak, Marta - On the complexity of the DNA Simplified Partial Digest Problem, in Volume 51;
  • Kassab, Randa - A New Approach to Intelligent Text Filtering Based on Novelty Detection, in Volume 49;
  • Kassabova, Diana - Motivational Patterns in Virtual Team Collaboration, in Volume 42;
  • Katajainen, Jyrki - On the Power of Structural Violations in Priority Queues, in Volume 65;
  • Katayama, Kaoru - An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories, in Volume 39;
  • Katayama, Yoshiaki - Redundant Parallel Data Transfer Schemes for the Grid Environment, in Volume 54;
  • Katsukura, Makoto - Assessing Usability for Input Operation using Frequency Components of Eye Movements, in Volume 93; - System Usability Evaluation for Input Operation using Oculo-motors, in Volume 64;
  • Kaufmann, Michael - Polygons Labelling of Minimum Leader Length, in Volume 60; - Usage-based Visualization of Web Locations, in Volume 9;
  • Kawasaki, Saori - Knowledge Visualization in Hepatitis Study, in Volume 60;
  • Kay, Judy - Integrating Ethical Content Into Computing Curricula, in Volume 30; - Learner Reflection in Student Self-assessment, in Volume 66; - Student satisfaction with groupwork in undergraduate computer science : do things get better?, in Volume 20; - The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66; - The Neglected Battle Fields of Syntax Errors, in Volume 20;
  • Kayed, Ahmad - Using Ontologies to Index Conceptual Structures for Tendering Automation, in Volume 5;
  • Kearney, David - Applications of Join Java, in Volume 6; - The Management of Applications for Reconfigurable Computing using an Operating System, in Volume 6;
  • Keedy, J. Leslie - Support for Subtyping and Code Re-use in Timor, in Volume 10;
  • Keefe, Karen - Adopting XP Practices for Teaching Object Oriented Programming, in Volume 52; - Using Extreme Programming in a Capstone Project, in Volume 30;
  • Kegel, Mark - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
  • Keim, Bob - Should we assess our students' attitudes?, in Volume 88;
  • Keith, Jonathan M. - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
  • Kelarev, A.V. - A Polynomial Algorithm for Codes Based on Directed Graphs, in Volume 51;
  • Kell, Catherine - Peer Assessment Using Aropa, in Volume 66;
  • Kelley, Karen - Analytics for Audit and Business Controls in Corporate Travel and Entertainment, in Volume 70;
  • Kelly, Peter M. - A Simplified Approach to Web Service Development, in Volume 54;
  • Kelly, Tim - A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments, in Volume 33; - Contract-Based Justification for COTS Component within Safety Critical Applications, in Volume 47; - Using Software Architecture Techniques to Support the Modular Certification of Safety-Critical Systems, in Volume 69;
  • Kelly, Wayne - Compiling Ruby on the CLR, in Volume 74; - Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework, in Volume 62; - G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework, in Volume 44; - Reasoning about Data Parallelism in Modern Object-Oriented Languages, in Volume 74;
  • Kelman, Chris - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
  • Kemp, Elizabeth - In Support of User Interface Design in the Rational Unified Process, in Volume 7; - What Makes a Good User Interface Pattern Language?, in Volume 28;
  • Kemp, Zarine - Interoperability for Geospatial Analysis: a Semantics and Ontology-based Approach, in Volume 63;
  • Kendall, Mike - Getting it Right From the Start: A Case Study of the Development of a Foundation Stage Learning and ICT Strategy in Northamptonshire, UK, in Volume 34; - ICT and the Teacher of the Future, in Volume 23;
  • Kenealy, Timothy - Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
  • Kenelly, John - Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
  • Kennedy, Angel - An Investigation of the State Formation and Transition Limitations for Prediction Problems in Recurrent Neural Networks, in Volume 74;
  • Kennedy, Geoffrey J. - Peer-assessment in Group Projects: Is it worth it?, in Volume 42;
  • Kennedy, Gregor E. - An Investigation into Keystroke Latency Metrics as an Indicator of Programming Performance, in Volume 42; - Connecting Learning Environments Using Electronic Voting Systems, in Volume 42;
  • Kennedy, Paul J. - Comparison of Visualization Methods of Genome-wide SNP Profiles in Childhood Acute Lymphoblastic Leukaemia, in Volume 87; - Investigating the Size and Value Effect in Determining Performance of Australian Listed Companies: A Neural Network Approach, in Volume 61; - Kernel-based Visualisation of Genes with the Gene Ontology, in Volume 87; - Using a Kernel-Based Approach to Visualize Integrated Chronic Fatigue Syndrome Datasets, in Volume 61;
  • Kennewell, Steve - Developing Research Models for ICT-Based Pedagogy, in Volume 23; - Student Teachers' Experiences and Attitudes Towards Using Interactive Whiteboards in the Teaching and Learning of Young Children, in Volume 34; - The Influence of a Technology-rich Classroom Environment on Elementary Teachers' Pedagogy and Children's Learning, in Volume 34;
  • Keogh, Eamonn - We Have Seen the Future, and It Is Symbolic, in Volume 32;
  • Khaled, O. Abou - Automating XML document Transformations: A conceptual modelling based approach, in Volume 31;
  • Khaled, Rilla - A Case Study of Cartoon Visualisation Using AspectJ, in Volume 24; - A Taxonomic Analysis of User-Interface Metaphors in the Microsoft Office Project Gallery, in Volume 40; - From Pushing Buttons to Play and Progress: Value and Interaction in Fable, in Volume 50; - InspectJ : Program Monitoring for Visualisation Using AspectJ, in Volume 16; - Persuasive Interaction for Collectivist Cultures, in Volume 50;
  • Khalil, Faten - A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses, in Volume 61; - Integrating Recommendation Models for Improved Web page prediction accuracy, in Volume 74;
  • Khan, Asad - Commodity-Grid Based Distributed Pattern Recognition Framework, in Volume 82;
  • Khan, Asad I. - Towards Dynamic Data Grid Framework for eResearch, in Volume 54;
  • Khan, Haroon R. - Understanding the Implementation of an Electronic Hospital Information System in a Developing Country: A Case Study from Pakistan, in Volume 97;
  • Khan, Khaled M. - Incorporating Business Requirements and Constraints in Database Conceptual Model, in Volume 31;
  • Khan, Umer - wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability, in Volume 87;
  • Khandekar, Anushree - A Methodology and Toolkit for Deploying Contract Documents as E-contracts, in Volume 83;
  • Khanli, L. Mohammad - Grid-JQA : Grid Java based Quality of service management by Active database, in Volume 54;
  • Khanna, Sankalp - An Efficient Method for Indexing Now-relative Bitemporal data, in Volume 27;
  • Khoo, Benjamin - Java Implementation Verification Using Reverse Engineering, in Volume 26;
  • Khoury, Gerald R. - Elastic Metaphors: Expanding the Philosophy of Interface Design, in Volume 37; - Enterprise Architecture Modelling using Elastic Metaphors, in Volume 31; - Modelling Enterprise Architectures: An Approach Based on Linking Metaphors and Ontologies, in Volume 58;
  • Ki, W. - Teacher Empowerment and Minimalist Design, in Volume 23;
  • Kiessling, Werner - Optimization of Relational Preference Queries, in Volume 39;
  • Kiili, Kristian - Technology Access : Resources Wasted in Computer Laboratories, in Volume 23;
  • Kildare, Robert - An online tool for learning collaboration and learning while collaborating., in Volume 52;
  • Kim, Bok Dong - Integrated Visualization for Geometry PIG Data, in Volume 60;
  • Kim, Han-joon - Automated Data Warehousing for Rule-based CRM Systems, in Volume 17;
  • Kim, James - Multi-Platform Document-Oriented GUIs, in Volume 93;
  • Kim, Jinman - A Solution to the Distribution and Standarization of Multimedia Medical Data in E-Health, in Volume 11; - A Web Based Medical Image Data Processing and Management System, in Volume 2; - Integrated Multimedia Medical Data Agent in E-Health, in Volume 11;
  • Kim, Kwangjo - Secure Key Issuing in ID-based Cryptography, in Volume 32;
  • Kim, Minkoo - wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability, in Volume 87;
  • Kim, Tae-Wan - A Distance-Based Packing Method for High Dimensional Data, in Volume 17;
  • Kim, Younghyun - Schemes of Storing XML Query Cache, in Volume 39;
  • King, Garry C. - A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data, in Volume 19;
  • King, John - Parents' and Students' Satisfaction with the Use of Information Technology in Government Schools in Queensland, Australia, in Volume 8;
  • King, Tristan - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
  • Kinnunen, Paivi - A doctoral course in research methods in computing education research. How should we teach it?, in Volume 88; - What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
  • Kinshuk - Applications of variation theory in computing education, in Volume 88; - Exploring Conceptions of programming, in Volume 52;
  • Kirby, Graham - Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
  • Kirchberg, Markus - On the Implication Problem for Functional Dependencies in the Higher-Order Entity-Relationship Model, in Volume 17; - Solving the Golden Transaction Problem for ARIES-based Multi-level Recovery, in Volume 92; - Using Reflection for Querying XML Documents, in Volume 49;
  • Kirley, Michael - Supporting Casual Tutors and Demonstrators: A case study in computer science and software engineering, in Volume 52;
  • Kit, Lau Hoi - Enumerating XML Data for Dynamic Updating, in Volume 39;
  • Kitagawa, Takashi - Visualization of Music Impression in Facial Expression to Represent Emotion, in Volume 53;
  • Kitamura, Motohiro - Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling, in Volume 96;
  • Kitiyadisai, Krisana - Bridging the Digital Divide from a Buddhist Perspective with Implications for Public Policy, in Volume 37;
  • Kitsuregawa, Masaru - WEB Community Mining and WEB Log Mining: Commodity Cluster Based Execution, in Volume 5;
  • Kiyoki, Yasushi - A Semantic Associative Computation Method for Automatic Decorative-Multimedia Creation with 'Kansei' Information, in Volume 96;
  • Klein, Gerwin - Formalising the L4 microkernel API, in Volume 51; - High Assurance System Software, in Volume 55;
  • Kleinermann, Frederic - Conceptual Modeling for Virtual Reality, in Volume 83;
  • Klukas, Christian - Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs, in Volume 60;
  • Knapskog, Svein J. - Belief Based Risk Analysis, in Volume 32;
  • Knauer, Christian - Constructing Optimal Highways, in Volume 65;
  • Kneale, Bruce - VELNET (Virtual Environment for Learning Networking), in Volume 30;
  • Knight, John - GP Attitudes towards Using HI Systems in Their Professional Role, in Volume 97;
  • Knight, John C. - Engineering, Communication, and Safety, in Volume 86;
  • Knobelsdorf, Maria - Computer science in context - pathways to computer science, in Volume 88;
  • Knowles, Greg - Hardware Acceleration of JPEG2000 Image Compression for Low-Power Embedded Applications, in Volume 16;
  • Kobayashi, Takumi - Information Gathering Support Interface by the Overview Presentation of Web Search Results, in Volume 60;
  • Kobayashi, Yuichi - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
  • Kodituwakku, Saluka R. - Pattern Categories: A Mathematical Approach for Organizing Design Patterns, in Volume 13;
  • Koehler, Henning - A Contraction Algorithm for finding Minimal Feedback Sets, in Volume 38; - Domination Normal Form - Decomposing Relational Database Schemas, in Volume 62; - Dynamic Data Warehouse Design as a Refinement in ASM-based Approach, in Volume 67;
  • Koh, Kern - Optimizing Web Content Delivery Using Web Server Accelerator, in Volume 4;
  • Koh, Yun Sing - Rare Association Rule Mining via Transaction Clustering, in Volume 87;
  • Kohl, Lutz - Puck - a visual programming system for schools, in Volume 88;
  • Kohli, G. - A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies, in Volume 38;
  • Koike, Hideki - STARMINE : A Visualization System for Cyber Attacks, in Volume 60;
  • Kolanski, Rafal - Formalising the L4 microkernel API, in Volume 51;
  • Koliadis, George - Business Process Integration: Method and Analysis, in Volume 96; - Model Eco-Systems: Preliminary Work, in Volume 79;
  • Kolyshkina, Inna - Customer Analytics Projects: Addressing Existing Problems with a Process that Leads to Success, in Volume 70;
  • Komina, Olga - RNA Secondary Structure Prediction with Simple Pseudoknots, in Volume 29;
  • Komisarczuk, Peter - A Board Game for Teaching Internet Engineering, in Volume 52; - Review of Work Experience in a Bachelor of Information Technology, in Volume 66;
  • Koncek, Helena - Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20;
  • Kong, Cindy - Towards a Semantic Basis for Rosetta, in Volume 26;
  • Kong, Richard - Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
  • Kong, Waiming - Support Vector Machine Approach for Cancer Detection Using Amplified Fragment Length Polymorphism (AFLP) Screening Method, in Volume 29;
  • Kongsuwan, Kritaya - Towards an understanding of protein-protein interaction network heirarchies. Analysis of DnaN-binding peptide motifs in members of protein families interacting with the eubacterial processivity clamp, the subunit of DNA Polymerase III, in Volume 19;
  • Kono, Hidetoshi - Structure-Function Relationship in DNA Sequence Recognition by Transcription Factors, in Volume 29;
  • Konsky, Brian R. von - Java Implementation Verification Using Reverse Engineering, in Volume 26;
  • Koo, Sang Ok - Integrated Visualization for Geometry PIG Data, in Volume 60;
  • Koppi, Tony - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
  • Koprinska, Irena - Classification of Brain-Computer Interface Data, in Volume 87;
  • Korb, Kevin B. - Take Heart II: A Modular Bayesian Decision Support System, in Volume 68;
  • Koschmider, Agnes - Measuring Similarity between Semantic Business Process Models, in Volume 67;
  • Koschuetzki, Dirk - Visual Analysis of Network Centralities, in Volume 60;
  • Kotagiri, Ramamohanarao - Approximate Data Mining in Very Large Relational Data, in Volume 49; - Policies for Sharing Distributed Probabilistic Beliefs, in Volume 16;
  • Kotsis, Gabriele - Towards Accurate Conflict Detection in a VCS for Model Artifacts: A Comparison of Two Semantically Enhanced Approaches, in Volume 96;
  • Kowalczyk, Ryszard - Intelligent Agents for Automated One-to-Many e-Commerce Negotiation, in Volume 4;
  • Kozlova, Iryna - Providing Semantically Equivalent, Complete Views for Multilingual Access to Integrated Data, in Volume 83;
  • Krawczyk, Stefan - Grid Resource Allocation : Allocation Mechanisms and Utilisation Patterns, in Volume 82;
  • Krieser, Francisco N. A. - SimEval - A Tool for Evaluating the Quality of Similarity Functions, in Volume 83;
  • Krishna, P. Radha - A Methodology and Toolkit for Deploying Contract Documents as E-contracts, in Volume 83; - Active Meta Modeling Support for Evolving E-contracts, in Volume 83;
  • Krishnaswamy, Shonali - Cost-Efficient Mining Techniques for Data Streams, in Volume 32;
  • Kristensen, Lars M. - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12; - Modelling and Initial Analysis of Operational Planning Processes using Coloured Petri Nets, in Volume 12; - Towards Formal Specification and Analysis of Avionics Mission Systems, in Volume 12;
  • Kriz, Ron - Visualising Class Cohesion with Virtual Worlds, in Volume 24;
  • Krumnack, Ulf - Extraction, evaluation and integration of lexical-semantic relations for the automated construction of a lexical ontology, in Volume 85;
  • Krzywicki, Alfred - A BDI Agent Architecture for Dialogue Modelling and Coordination in a Smart Personal Assistant, in Volume 57;
  • Kuehnberger, Kai-Uwe - Aspects of Automatic Ontology Extension: Adapting and Regeneralizing Dynamic Updates, in Volume 72;
  • Kuffner, Adam - Image Feature Evaluation for Contents-based Image Retrieval, in Volume 56;
  • Kuhne, Thomas - Contrasting Classification with Generalisation, in Volume 96;
  • Kumar, Dinesh K. - Vowel recognition of English and German language using Facial movement(SEMG) for Speech control based HCI, in Volume 56;
  • Kumar, Dinesh Kant - Hand gestures for HCI using ICA of EMG, in Volume 56; - Voiceless Speech Recognition Using Dynamic Visual Speech Features, in Volume 56;
  • Kumar, P. K. Ajith - Decoding Doodles: Novice Programmers and Their Annotations, in Volume 66;
  • Kumar, P.K. Ajith - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
  • Kummerfeld, Bob - 'Powerpoint to the People' : Suiting the Word to the Audience, in Volume 28; - Integrating Ethical Content Into Computing Curricula, in Volume 30;
  • Kummerfeld, Sarah K. - The Neglected Battle Fields of Syntax Errors, in Volume 20;
  • Kung, H.F. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
  • Kunze, Marcel - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54; - Grid Computing in Europe: From Research to Deployment, in Volume 44;
  • Kuo, Chung J. - Visualisation and Comparison of DNA Sequences by Use of Three-Dimensional Trajectories, in Volume 19;
  • Kuo, Dean - Transactions in Loosely Coupled Distributed Systems, in Volume 17;
  • Kurata, Ken-ichi - Evaluation of Unique Sequences on the European Data Grid, in Volume 19;
  • Kurokawa, Taketo - Japanese Landscape and My Environmental Design, in Volume 60;
  • Kurowski, Maciej - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
  • Kurzel, Frank - Adaptive Learning Environments for CS Education : From AMLE to Live Spaces, in Volume 20;
  • Kutay, Cat - Up Close and Pedagogical: Computing Academics Talk About Teaching, in Volume 52;
  • Kuts, Ekaterina - Computer science students can help to solve problems of multiplayer mobile games, in Volume 88;
  • Kutty, Sangeetha - PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees, in Volume 70;
  • Kutz, Oliver - Heterogeneously Structured Ontologies - Integration, Connection, and Refinement, in Volume 90;
  • Kwan, Paul W.H. - A Multi-step Strategy for Approximate Similarity Search in Image Databases, in Volume 49;
  • Kwok, Lam-for - Electronic Information Security Documentation, in Volume 21;
  • Kwon, Hyok Don - Integrated Visualization for Geometry PIG Data, in Volume 60;
  • Kwong, Hugh H.F. - A Method of Automatic Grade Calibration in Peer Assessment, in Volume 42;
Top of List

L

  • Laakso, Mikko-Jussi - VILLE - a language-independent program visualization tool, in Volume 88;
  • Labudde, Dirk - 2D Visualisation of SMFS Data on Membrane Proteins, in Volume 83;
  • Ladkin, Peter B. - Causal Analysis of the ACAS/TCAS Sociotechnical System, in Volume 47; - Two Causal Analyses of the Black Hawk Shootdown during Operation Provide Comfort, in Volume 33;
  • Laffey, James M. - Appropriation, Mastery and Resistance to Technology in Early Childhood Preservice Teacher Education: Case Studies, in Volume 34;
  • Lahtinen, Essi - CLIP, a Command Line InterPreter for a subset of C++, in Volume 88; - Effectiveness of integrating program visualizations to a programming course, in Volume 88; - Fighting the student dropout rate with an incremental programming assignment, in Volume 88; - Why should we bore students when teaching CS?, in Volume 88;
  • Lai, David - Incorporating programming strategies explicitly into curricula, in Volume 88;
  • Lai, Feipei - Sentry Tag: An Efficient Filter Scheme for Low Power Cache, in Volume 6;
  • Lai, Paulo - Informative 3D Visualization of Multiple Protein Structures, in Volume 29;
  • Lai, Wei - A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization, in Volume 38; - Force-Transfer : A New Approach to Removing Overlapping Nodes in Graph Layout, in Volume 16; - On the Structural Algorithm of Filtering Graphs for Layout, in Volume 36;
  • Lakos, Charles - Lightweight Consistency Analysis of Dataflow Process Networks, in Volume 16; - Towards a Semantic Basis for Rosetta, in Volume 26;
  • Lala, Gita H. - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
  • Lam, Franky - Dynamic Labeling Schemes for Ordered XML Based on Type Information, in Volume 49; - Querying and Maintaining Ordered XML Data using Relational Databases, in Volume 39;
  • Lam, Fred C. - Nonparametric Approaches to Detecting Differentially Expressed Genes in Replicated Microarray Experiments, in Volume 29;
  • Lam, H.C. - Teacher Empowerment and Minimalist Design, in Volume 23;
  • Lam, Peng - Determining Component Reliability Using a Testing Index, in Volume 4;
  • Lam, T.W. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
  • Lambert, Dale - Mephisto I. - Towards a Formal Theory, in Volume 72;
  • Lambrix, Patrick - Towards Transparent Access to Multiple Biological Databanks, in Volume 19;
  • Lamirel, Jean-Charles - A New Approach to Intelligent Text Filtering Based on Novelty Detection, in Volume 49;
  • Lamouchi, Olfa - A Framework Based Measurements for Evaluating an IS Quality, in Volume 79;
  • Lan, Mingjun - Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
  • Lane, Nicholas - An Empirical Study of Textual and Graphical Travel Itinerary Visualization using Mobile Phones, in Volume 18;
  • Lane, T. - A Generic Connectionist-Based Method for On-Line Feature Selection and Modelling with a Case Study of Gene Expression Data Analysis, in Volume 19;
  • Lang, Bruno - On The Optimal Working Set Size in Serial and Parallel Support Vector Machine Learning With The Decomposition Algorithm, in Volume 61;
  • Lang, Catherine - The Next Wave of Gender Projects in IT Curriculum and Teaching at Universities, in Volume 52;
  • Lange, Detta - Teachers Rethinking Curriculum Approaches within a New Basics Framework , in Volume 34;
  • Langemann, Dirk - Selfish-brain Theory: Challenges in the Top-down Analysis of Metabolic Supply Chains, in Volume 83;
  • Lanham, Elicia. J. - Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
  • Lanthier, Mark A. - Calculating the Meeting Point of Scattered Robots on Weighted Terrain Surfaces, in Volume 41;
  • Lariviere, Damien - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
  • Larkin, James - Self-Replicating Expressions in the Lambda Calculus, in Volume 26;
  • Latu, Savae - Teaching ICT to Pacific Island Background Students, in Volume 30;
  • Lau, Derek - Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries, in Volume 63;
  • Lau, Kim - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
  • Laurent, Anne - S2MP: Similarity Measure for Sequential Patterns, in Volume 87;
  • Lauria, Mario - Mega Weaver: A Simple Iterative Approach for BAC Consensus Assembly, in Volume 29;
  • Lauwereins, Rudy - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
  • Laval, Ernesto - Improving Literacy and Numeracy in Poor Schools: The Main Challenge in Developing Countries, in Volume 34;
  • Lavery, William J. - The Semantic Reef: Managing Complex Knowledge to Predict Coral Bleaching on the Great Barrier Reef, in Volume 68;
  • Laxer, Cary - Evolution of an International Collaborative Student Project, in Volume 95; - Facilitating Global Computing Education Through Study Abroad and Collaborative Projects, in Volume 52;
  • Le, Quynh - Where Does the Superhighway Lead Us? A Learners' Perspective, in Volume 8;
  • Le, Thao - Collaborate to Learn and Learn to Collaborate, in Volume 8; - Where Does the Superhighway Lead Us? A Learners' Perspective, in Volume 8;
  • Leach, Geoff - eScience Curricula at Two Australian Universities, in Volume 42;
  • Leaney, John - First Year Programming: Let All the Flowers Bloom, in Volume 20;
  • Leckie, Christopher - Approximate Data Mining in Very Large Relational Data, in Volume 49; - Policies for Sharing Distributed Probabilistic Beliefs, in Volume 16; - Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, in Volume 38;
  • Leclercq, Eric - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
  • Lee, Byoungcheon - Secure Key Issuing in ID-based Cryptography, in Volume 32;
  • Lee, Gareth - A Generalised Spreadsheet Verification Methodology, in Volume 4; - Determining Component Reliability Using a Testing Index, in Volume 4; - Exploiting FPGA Concurrency to Enhance JVM Performance, in Volume 26;
  • Lee, Jeremy Y. - On Modelling Real-Time Mobile Processes, in Volume 4;
  • Lee, Lawrence K. - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19;
  • Lee, Michael D. - An Empirical Evaluation of Chernoff Faces, Star Glyphs, and Spatial Visualisations for Binary Data, in Volume 24; - Role of Edge Detection in Video Semantics, in Volume 22;
  • Lee, Minho - Integrated Visualization for Geometry PIG Data, in Volume 60;
  • Lee, Mira - Computing a Minimum-Dilation Spanning Tree is NP-hard, in Volume 65;
  • Lee, Sang Ho - An Empirical Study of Similarity Search in Stock Data, in Volume 84;
  • Lee, Sang-goo - Automated Data Warehousing for Rule-based CRM Systems, in Volume 17;
  • Lee, Scott U. K. Jin - Towards Verifying Semistructured Data, in Volume 67;
  • Lee, Sofianto - Experiments in the Dynamics of Phase Coupled Oscillators When Applied to Graph Colouring, in Volume 74;
  • Lee, TaeHee - Automated Data Warehousing for Rule-based CRM Systems, in Volume 17;
  • Lee, Tan - A New Lip Feature Representation Method for Video-based Bimodal Authentication, in Volume 57;
  • Lee, Tien Yu - Computer Assisted Assessment of SQL Query Skills, in Volume 63;
  • Lee, Vincent - A ConceptLink Graph for Text Structure Mining, in Volume 91;
  • Lee, Vincent C. S. - Adaptive Spike Detection for Resilient Data Stream Mining, in Volume 70; - Discovering Frequent Sets from Data Streams with CPU Constraint, in Volume 70;
  • Lee, Yi-Yi - Mental Map Preserving Graph Drawing Using Simulated Annealing, in Volume 60;
  • Lee, Young-Koo - ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns, in Volume 87;
  • Lefevre, Laurent - Improving the Flexibility of Active Grids through Web Services, in Volume 54; - Supporting Large Scale eResearch Infrastructures with Adapted Live Streaming Capabilities, in Volume 82;
  • Lefort, Laurent - Large scale colour ontology generation with XO, in Volume 58; - Towards Scalable Ontology Engineering Patterns: Lessons Learned from an Experiment based on W3Cs Part-whole Guidelines, in Volume 72;
  • Leinweber, Derek - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
  • Leist, Arno - A Small-World Network Model for Distributed Storage of Semantic Metadata, in Volume 99;
  • Leisten, Susanna - Using a Network Simulation Tool to Engage Students in Active Learning Enhances Their Understanding of Complex Data Communications Concepts., in Volume 42;
  • Leitch, Shona - The Issue of Ethics in Electronic Commerce, in Volume 1;
  • Lenarcic, John - The Open Source Singularity: A Postmodernist View, in Volume 37;
  • Leopold, Jennifer L. - Identifying Character Non-Independence in Phylogenetic Data Using Data Mining Techniques, in Volume 29;
  • Lesslie, Rob - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
  • Lester, Nicholas - In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems, in Volume 26;
  • Leung, Kingsly - Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, in Volume 38;
  • Levis, Alexander H. - Synthesizing Executable Models of Object Oriented Architectures, in Volume 12;
  • Levit, Vadim - Well-covered Graphs and Greedoids, in Volume 77;
  • Levy, Neil - Cyborgs-R-Us, in Volume 37;
  • Levy, Nicole - A Framework Based Measurements for Evaluating an IS Quality, in Volume 79;
  • Lewis, Andrew - A Template Based Static Coalition Protocol - A3PviGrid, in Volume 54; - Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids, in Volume 82;
  • Lewis, Sue - The Next Wave of Gender Projects in IT Curriculum and Teaching at Universities, in Volume 52;
  • Lewis, Trent W. - Audio-Visual Speech Recognition Using Red Exclusion and Neural Networks, in Volume 4; - Lip Feature Extraction Using Red Exclusion, in Volume 2; - Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition, in Volume 26;
  • Li, Chunping - TRACK : A Novel XML Join Algorithm for Efficient Processing Twig Queries, in Volume 75;
  • Li, Dahai - Haptic Shoes: Representing Information By Vibration, in Volume 45;
  • Li, Dongyang - TRACK : A Novel XML Join Algorithm for Efficient Processing Twig Queries, in Volume 75;
  • Li, J. S. Jimmy - Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images, in Volume 26;
  • Li, Jane - A Collaborative Guidance Case Study, in Volume 76;
  • Li, Jianxin - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75; - Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75;
  • Li, Jianzhong - Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
  • Li, Jie-Tsung - Tracking the Changes of Dynamic Web Pages in the Existence of URL Rewriting, in Volume 61;
  • Li, Jinyan - Feature Space Transformation and Decision Results Interpretation, in Volume 19; - From Informatics to Bioinformatics, in Volume 19; - Use of Built-in Features in the Interpretation of High-dimensional Cancer Diagnosis Data, in Volume 29;
  • Li, Jiuyong - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61; - A Framework for Role-based group delegation in distributed environment, in Volume 48; - A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses, in Volume 61; - A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73; - Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61; - Integrating Recommendation Models for Improved Web page prediction accuracy, in Volume 74; - Microdata Protection Through Approximate Microaggregation, in Volume 91; - Priority Driven K-Anonymisation for Privacy Protection, in Volume 87; - Using Association Rules to Make Rule-based Classifiers Robust, in Volume 39;
  • Li, Ki-Joune - A Distance-Based Packing Method for High Dimensional Data, in Volume 17;
  • Li, Kuo-Bin :Wang, Yi - Multiple Sequence Alignment Using Tabu Search, in Volume 29;
  • Li, Li - Agent-based Ontology Integration for Ontology-based Applications, in Volume 58;
  • Li, Lichao - Learner Reflection in Student Self-assessment, in Volume 66;
  • Li, Ling - Cloth Animation with Adaptively Refined Meshes, in Volume 38;
  • Li, Min - An efficient hash-based algorithm for minimal k-anonymity, in Volume 74; - Privacy-aware Access Control with Generalization Boundaries, in Volume 91;
  • Li, Ming - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
  • Li, Qing - Multimedia Data Modelling: Moving Up the Ladder, in Volume 79;
  • Li, Shuai Cheng - Faster Algorithms for Finding Missing Patterns, in Volume 51;
  • Li, Wanchun - Adding Filtering to Geometric Distortion to Visualize a Clustered Graph on Small Screens, in Volume 35; - Using Spring Algorithms to Remove Node Overlapping, in Volume 45;
  • Li, Xiaoming - From WebArchive to WebDigest : Concept and Examples, in Volume 75;
  • Li, Xiaosong - Teaching Introductory Programming to Information Systems and Computing Majors: Is There a Difference?, in Volume 30;
  • Li, Xue - A Reconstruction-based Algorithm for Classification Rules Hiding, in Volume 49; - Data Reduction Approach for Sensitive Association Classification Rule Hiding, in Volume 75; - Determining the Fitness of a Document Model by Using Conflict Instances, in Volume 39; - Document Generality: its Computation for Ranking, in Volume 49; - Graph Mining based on a Data Partitioning Approach, in Volume 75; - Ranking-Constrained Keyword Sequence Extraction from Web Documents, in Volume 92; - Recency-Based Collaborative Filtering, in Volume 49;
  • Li, Xueming - Ontological Semantics for the Use of UML in Conceptual Modeling, in Volume 83;
  • Li, Yamin - Metacube - A New Interconnection Network for Large Scale Parallel Systems, in Volume 6;
  • Li, Yijun - A Confidence Based Recognition System for TV Commercial Extraction, in Volume 75;
  • Li, Yuan Fang - Towards Verifying Semistructured Data, in Volume 67;
  • Li, Yuefeng - Data Mining For Lifetime Prediction of Metallic Components, in Volume 61; - PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees, in Volume 70;
  • Liang, Ping - Detecting Anomalous Longitudinal Associations Through Higher Order Mining, in Volume 84; - Discovering Itemset Interactions, in Volume 91;
  • Liao, Chia-Hung - Exploiting Speculative Value Reuse Using Value Prediction, in Volume 6;
  • Liao, Hong-Yuan - An Integrated Approach to Video Retrieval, in Volume 75;
  • Liegl, Philipp - Conceptual Business Document Modeling using UN/CEFACT's Core Components, in Volume 96;
  • Liew, Alan Wee-Chung - Gene Expression Data Clustering and Visualization Based on a Binary Heirarchical Clustering Framework, in Volume 19; - Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
  • Lifeng, Duan - Line Drawing in Virtual Reality using a Game Pad, in Volume 50;
  • Liggesmeyer, Peter - A New Component Concept for Fault Trees, in Volume 33;
  • Lim, Chee Chern - Shape Similarity Search Using XML and Portal Technology, in Volume 36; - Web-based Multimedia GP Medical System, in Volume 36;
  • Lim, Ee-Peng - CrystalBall : A Framework for Mining Variants of Association Rules, in Volume 17;
  • Lim, Joo-Hwee - Home Photo Indexing using Learned Visual Keywords, in Volume 22; - Image Mosaics Based on Homogenous Coordinates, in Volume 22; - Using Dual Cascading Learning Frameworks for Image Indexing, in Volume 36;
  • Lim, Yu S. - A Web-based Collaborative System for Medical Image Analysis and Diagnosis, in Volume 2; - Web-based Multimedia Collaboration System for Medical Images Analysis and Diagnosis, in Volume 22;
  • Lim, Yusuk - Web-based Image Authentication Using Invisible Fragile Watermark, in Volume 11;
  • Limaye, Nutan - Longest Paths in Planar DAGs in Unambiguous Logspace, in Volume 94;
  • Limthanmaphon, Benchaphon - Web Service Composition Transaction Management, in Volume 27; - Web Service Composition with Case-Based Reasoning, in Volume 17;
  • Lin, Chun-Cheng - Mental Map Preserving Graph Drawing Using Simulated Annealing, in Volume 60;
  • Lin, Jessica - We Have Seen the Future, and It Is Symbolic, in Volume 32;
  • Lin, Joe Y.-C. - Customizing Internal Activity Behaviour for Flexible Process Enforcement, in Volume 27;
  • Lin, Li - The Fish-eye Visualization of Foreign Currency Exchange Data Streams, in Volume 45;
  • Lin, Marie - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
  • Lin, Ming-Yen - Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream, in Volume 75;
  • Lin, Nan - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
  • Lin, Wilfred W. K. - A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively, in Volume 38;
  • Lin, Xuemin - Clustering Moving Objects for Spatio-temporal Selectivity Estimation, in Volume 27; - Continuously Maintaining Order Statistics over Data Streams, in Volume 63; - Multi-resolution Algorithms for Building Spatial Histograms, in Volume 17;
  • Lin, Yuanlie - A Novel Method for Protein Subcellular Localization Based on Boosting and Probabilistic Neural Network, in Volume 29;
  • Lin, Yuqing - An open problem: (4; g)-cages with odd g <= 5 are tightly connected, in Volume 65;
  • Lin, Zheng - Unseeded Region Growing for 3D Image Segmentation, in Volume 2;
  • Lindsay, Peter - HazLog: Tool Support for Hazard Management, in Volume 47; - Improved Acquisition Processes for Safety-Critical Systems in the Australian Department of Defence, in Volume 3; - Modelling Erroneous Operator Behaviours for an Air-Traffic Control Task, in Volume 7; - Supporting Component-Based Reuse in CARE, in Volume 4;
  • Lindstrom, Bo - Operational Planning using Web-Based Interfaces to a Coloured Petri Net Simulator of Influence Nets, in Volume 12;
  • Ling, Tok Wang - Update XML Data by Using Graphical Languages, in Volume 83;
  • Lingas, Andrzej - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41; - On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
  • Link, Sebastian - Constraint Acquisition - You Can Chase but You Cannot Find, in Volume 79; - English Sentence Structures and EER Modeling, in Volume 67; - Horn Clauses and Functional Dependencies in Complex-value Databases, in Volume 49; - Know your Limits: Enhanced XML Modeling with Cardinality Constraints, in Volume 83; - Normalisation in the Presence of Lists, in Volume 27; - On Inferences of Full Hierarchical Dependencies, in Volume 62; - On the Implication Problem for Functional Dependencies in the Higher-Order Entity-Relationship Model, in Volume 17; - On the Logical Implication of Multivalued Dependencies with Null Values, in Volume 51;
  • Lippe, W. -M. - Analysing MEG-Data by a Combination of Different Neural Networks, in Volume 19;
  • Lister, Raymond - A citation analysis of the ACE2005 - 2007 proceedings, with reference to the June 2007 CORE conference and journal rankings, in Volume 78; - A Citation Analysis of the ACSC 2006-2008 Proceedings, with Reference to the CORE Conference and Journal Rankings, in Volume 91; - A Comparison of Different Approaches to the Introductory Programming Course, in Volume 52; - A Focus Group Study of Student Attitudes to Lectures, in Volume 95; - After the gold rush: toward sustainable scholarship in computing, in Volume 78; - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52; - Debating the OO debate: where is the problem?, in Volume 88; - Differing Ways that Computing Academics Understand Teaching, in Volume 66; - Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52; - Experiments in the Dynamics of Phase Coupled Oscillators When Applied to Graph Colouring, in Volume 74; - First Year Programming: Let All the Flowers Bloom, in Volume 20; - Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78; - Multi-Institutional Teaching Communities in Computer Education, in Volume 52; - One Small Step Toward a Culture of Peer Review and Multi-Institutional Sharing of Educational Resources: A Multiple Choice Exam for First Semester Programming Students, in Volume 42; - Teaching Java First: Experiments with a Pigs-Early Pedagogy, in Volume 30; - The BRACElet 2009.1 (Wellington) Specification, in Volume 95; - The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66; - The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78; - Up Close and Pedagogical: Computing Academics Talk About Teaching, in Volume 52; - Why Teach Unix?, in Volume 66;
  • Litchfield, Andrew - The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
  • Little, Joyce Currie - Using Cases to Increase Interest in ICT and Computing as a Career, in Volume 23;
  • Liu, Anna - Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf, in Volume 16; - Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
  • Liu, Chengfei - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75; - Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75; - Supporting Virtual Organisation Alliances with Relative Workflows, in Volume 53;
  • Liu, Chuchang - Access Control Models and Security Labelling, in Volume 62; - Combining Logics for Modelling Security Policies, in Volume 38; - Towards Security Labelling, in Volume 48;
  • Liu, Congrong - Modelling and Design of VAML, in Volume 11;
  • Liu, Huiqing - Use of Built-in Features in the Interpretation of High-dimensional Cancer Diagnosis Data, in Volume 29;
  • Liu, Jiming - Mobile Information Exchange and Integration: From Query to Application Layer, in Volume 92;
  • Liu, Jing - Ranking-Constrained Keyword Sequence Extraction from Web Documents, in Volume 92;
  • Liu, Jixue - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75;
  • Liu, Junyang - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
  • Liu, Ke - A Min-Min Average Algorithm for Scheduling Transaction-Intensive Grid Workflows, in Volume 99;
  • Liu, Lin - Verification of the SIP Transaction Using Coloured Petri Nets, in Volume 91;
  • Liu, Na - A Visual Language and Environment for Specifying User Interface Event Handling in Design Tools, in Volume 64;
  • Liu, Nianjun - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
  • Liu, Qing - Multi-resolution Algorithms for Building Spatial Histograms, in Volume 17;
  • Liu, Qiong - Digital Rights Management for Content Distribution, in Volume 21;
  • Liu, Vicky - Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98; - Open Trusted Health Informatics Structure (OTHIS), in Volume 80; - Privacy and Security in Open and Trusted Health Information Systems, in Volume 97; - Visually Sealed and Digitally Signed Documents, in Volume 26;
  • Liu, Wei - Determining Termhood for Learning Domain Ontologies in a Probabilistic Framework, in Volume 70; - Determining Termhood for Learning Domain Ontologies using Domain Prevalence and Tendency, in Volume 70; - Integrated Scoring For Spelling Error Correction, Abbreviation Expansion and Case Restoration in Dirty Text, in Volume 61; - Measuring Data-Driven Ontology Changes using Text Mining, in Volume 70;
  • Liu, Yan - Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
  • Lloyd, Margaret - Reinvention of Childhood in a Networked World, in Volume 8;
  • Lo, Neng-Wen - Visualisation and Comparison of DNA Sequences by Use of Three-Dimensional Trajectories, in Volume 19;
  • Loekito, Elsa - Are Zero-suppressed Binary Decision Diagrams Good for Mining Frequent Patterns in High Dimensional Datasets?, in Volume 70;
  • Loeser, Chris - Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices, in Volume 26;
  • Loh, Allan - The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
  • Loh, Peter K. K. - Embedding of Fault-Tolerant Trees in the Josephus Cube, in Volume 6;
  • Lokan, Chris - Using Chronological Splitting to Compare Cross- and Single-company Effort Models: Further Investigation, in Volume 91;
  • Lonardi, Stefano - We Have Seen the Future, and It Is Symbolic, in Volume 32;
  • Long, Benjamin - Cross-Layer Verification of Type Flaw Attacks on Security Protocols, in Volume 62; - Formalising Key-Distribution in the Presence of Trust using Object-Z, in Volume 21;
  • Long, Gregory - Plug-in Proof Support for Formal Development Environments, in Volume 41;
  • Longley, Dennis - Electronic Information Security Documentation, in Volume 21;
  • Lonnberg, Jan - How Students Develop Concurrent Programs, in Volume 95; - Students' understandings of concurrent programming, in Volume 88;
  • Looi, M. - Security as a Safety Issue in Rail Communications, in Volume 33;
  • Loomes, Graham - Eliciting Measures of Value for Health and Safety, in Volume 47;
  • Lopez, Mike - Surely We Must Learn to Read before We Learn to Write!, in Volume 95;
  • Losberg, Warren - Student satisfaction with groupwork in undergraduate computer science : do things get better?, in Volume 20;
  • Lovatt, Howard C. - A Pattern Enforcing Compiler (PEC) for Java: Using the Compiler, in Volume 43;
  • Loveless, Avril - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
  • Lovie-Kitchins, Jan - Data Mining in Conceptualising Active Ageing, in Volume 61;
  • Lowe, Nick - Visualization of a Closed Three-Dimensional Surface using Portal-based Rendering, in Volume 60;
  • Lu, Feng - A JMX Toolkit for Merging Network Management Systems, in Volume 48; - A RMI Protocol for Aglets, in Volume 26;
  • Lu, Hongen - Structure Based Semantic Measurement for Information Filtering Agents, in Volume 85;
  • Lu, Hongjun - On Efficient Management of XML Documents, in Volume 17; - Path Materialization Revisited: An Efficient Storage Model for XML Data, in Volume 5;
  • Lu, J. - Rule Sets Based Bilevel Decision Model, in Volume 48;
  • Lu, Lici - Extensible Job Managers for Grid Computing, in Volume 16;
  • Lu, Ruopeng - Using a Temporal Constraint Network for Business Process Execution, in Volume 49;
  • Lu, Wei C. - Visualisation and Comparison of DNA Sequences by Use of Three-Dimensional Trajectories, in Volume 19;
  • Lu, Weiming - Weak Parametric Failure Equivalences and Their Congruence Formats, in Volume 77;
  • Lu, Xiaoyan - Aggregation Query Model for OODBMS, in Volume 10; - ODMG Extension of Composite Objects in OODBMS: A Proposal, in Volume 10;
  • Lu, Yanmei - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
  • Luca, Joe - Using Blended Learning to Enhance Teaching and Learning, in Volume 52;
  • Lucas, Richard - Why Bother? Ethical Computers - That's Why!, in Volume 1;
  • Lucey, Patrick - Patch-Based Representation of Visual Speech, in Volume 56;
  • Lucey, Simon - Face Refinement through a Gradient Descent Alignment Approach, in Volume 56;
  • Lucke, Dominik - Heterogeneously Structured Ontologies - Integration, Connection, and Refinement, in Volume 90;
  • Luerssen, Martin H. - Graph Grammar Encoding and Evolution of Automata Networks, in Volume 38;
  • Lui, Siu Man - Safely Delegating Data Mining Tasks, in Volume 61;
  • Lundberg, Chris - TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
  • Lundberg, Jonas - Lessons Learned from Facilitation in Collaborative Design, in Volume 64;
  • Lundell, Eva-Marta - On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
  • Luo, Bing - Performance Evaluation on a Micro-threading Pipeline, in Volume 6;
  • Luo, Hong - Initial SARS Genome Data Analysis Using a Bioinformatics Platform, in Volume 29;
  • Luo, Jingchu - Initial SARS Genome Data Analysis Using a Bioinformatics Platform, in Volume 29;
  • Luo, Jizhou - Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
  • Luoma, Harri - CLIP, a Command Line InterPreter for a subset of C++, in Volume 88;
  • Lutteroth, Christof - A Maturity Model for Computing Education, in Volume 66; - Automated Reverse Engineering of Hard-Coded GUI Layouts, in Volume 76; - Multi-Platform Document-Oriented GUIs, in Volume 93; - User Interface Layout with Ordinal and Linear Constraints, in Volume 50;
  • Luu, Justin - Investigating the Size and Value Effect in Determining Performance of Australian Listed Companies: A Neural Network Approach, in Volume 61;
  • Luxton-Reilly, Andrew - A Maturity Model for Computing Education, in Volume 66; - Bloom's Taxonomy for CS assessment, in Volume 78; - Quality of Student Contributed Questions Using PeerWise, in Volume 95; - The PeerWise system of student contributed assessment questions, in Volume 78;
  • Lv, Jianghua - An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries, in Volume 83;
  • Lynar, Timothy M. - A Grid Resource Allocation Mechanism for Heterogeneous E-waste Computers, in Volume 99;
  • Lynch, Kathy - A Studio-Based Approach to Teaching Information Technology, in Volume 8;
  • Lysaght, Pauline - Child's Play: Computer Games, Theories of Play and Children's Development, in Volume 34;
  • Lyuu, Yuh-Dauh - Spreading of Messages in Random Graphs, in Volume 94; - Testing Embeddability Between Metric Spaces, in Volume 77;
Top of List

M

  • Ma Perez, Jesus - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87; - Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
  • Ma, Fangrui - EMAGEN: An Efficient Approach to Multiple Whole Genome Alignment, in Volume 29; - RNA Secondary Structure Prediction with Simple Pseudoknots, in Volume 29;
  • Ma, Hui - A Heuristic Approach to Cost-Efficient Derived Horizontal Fragmentation of Complex Value Databases, in Volume 63; - A Heuristic Approach to Cost-Efficient Fragmentation and Allocation of Complex Value Databases, in Volume 49; - Conceptual Application Domain Modelling, in Volume 96; - Context Analysis: Toward Pragmatics of Web Information Systems Design, in Volume 79;
  • Ma, Jiangang - Discovering User Access Pattern Based on Probabilistic Latent Factor Model, in Volume 39;
  • Ma, Kenneth T.K. - A Method of Automatic Grade Calibration in Peer Assessment, in Volume 42;
  • Ma, Kwan-Liu - BiblioViz: A System for Visualizing Bibliography Information, in Volume 60; - Cyber Security Through Visualization, in Volume 60;
  • Ma, Liping - Document Classification via Structure Synopses, in Volume 17;
  • Ma, Lisha - Condensative Stream Query Language for Data Streams, in Volume 63;
  • Ma, Shilong - An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries, in Volume 83;
  • Maarek, Yoelle - A Grammer View for Editing Structured Documents, in Volume 11;
  • Mabotuwana, Thusitha - Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
  • MacColl, Ian - Ambient Interaction Framework - Software Infrastructure for the Rapid Development of Pervasive Computing Environments, in Volume 25;
  • MacDonald, Anthony - Extending and Evaluating a Pattern Language for Safety-Critical User Interfaces, in Volume 3; - Integration of generic program analysis tools into a software development environment, in Volume 38;
  • MacDonald, Chris S. - The Development of a Distributed Capability System for VLOS, in Volume 6;
  • Machanick, Philip - Peer Assessment for Action Learning of Data Structures and Algorithms, in Volume 42;
  • Machi, Hidetomo - The Relative Completeness of a Version of CTL*, in Volume 41;
  • Maciaszek, Leszek A. - Modeling and Engineering Adaptive Complex Systems, in Volume 83; - Roundtrip Architectural Modelling, in Volume 43;
  • MacIsaac, Peter - Principles for Modelling of a Dose Form Vocabulary, in Volume 58;
  • Mackay, Daniel - A Lightweight Web-Based Case Tool for UML Class Diagrams, in Volume 18;
  • Mackel, Oliver - A New Component Concept for Fault Trees, in Volume 33;
  • MacNish, Cara - An Investigation of the State Formation and Transition Limitations for Prediction Problems in Recurrent Neural Networks, in Volume 74;
  • Madden, Chris - Visualising Internet Traffic Data with Three-Dimensional Spherical Display, in Volume 45;
  • Maddern, Rowan - The application of data mining techniques to characterize agricultural soil profiles, in Volume 70;
  • Maeder, Anthony - Assessing Viewing Pattern Consistency in Mammogram Readers, in Volume 97; - Characterizing Image Properties for Digital Mammograms, in Volume 97; - e-Research Meets e-Health, in Volume 80;
  • Maetschke, Stefan - Higher Order HMMs for Localization Prediction of Transmembrane Proteins, in Volume 73;
  • Maetschke, Stefan R. - Bacterial Promoter Modeling and Prediction for E. Coli and B. Subtilis with Beagle, in Volume 73; - Comparing SVM Sequence Kernels: A Subcellular Localization Theme, in Volume 73;
  • Magenheim, Johannes - Social, Affective and Normative Aspects of Learning in ICT-Enriched Learning Environments - Collaborative Exploration of Societal Aspects of ICT, in Volume 23;
  • Maglia, Anne M. - Identifying Character Non-Independence in Phylogenetic Data Using Data Mining Techniques, in Volume 29;
  • Mahajan, Meena - Longest Paths in Planar DAGs in Unambiguous Logspace, in Volume 94;
  • Mahdavi, Mehregan - A Collaborative Approach for Caching Dynamic Data in Portal Applications, in Volume 27;
  • Maher, Michael - Rewriting General Conjunctive Queries Using Views, in Volume 5;
  • Mahony, B. P. - A Lightweight Approach to Formal Safety Architecture Assurance: The PARTI Case Study, in Volume 100;
  • Mahony, Brendan - Guidance for Def (Aust) 5679 Issue 2, in Volume 100; - Hierarchical Verification Environment, in Volume 55; - Revision of Australian Defence Standard Def (Aust) 5679, in Volume 55;
  • Maier, David - Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE, in Volume 31;
  • Maindonald, John - Data Mining Methodological Weaknesses and Suggested Fixes, in Volume 61;
  • Maj, S.P. - A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies, in Volume 38; - Modelling Layer 2 and Layer 3 Device Bandwidths using B-Node Theory, in Volume 48;
  • Majumdar, Anirban - Manufacturing Opaque Predicates in Distributed Systems for Code Obfuscation, in Volume 48;
  • Makela, Marko - Efficiently Verifying Safety Properties with Idle Office Computers, in Volume 12;
  • Makino, Kazuhisa - Augmenting Edge-Connectivity between Vertex Subsets, in Volume 94;
  • Malik, Muzaffar A. - Understanding the Implementation of an Electronic Hospital Information System in a Developing Country: A Case Study from Pakistan, in Volume 97;
  • Malik, Petra - Interaction Design for a Mobile Context-Aware System using Discrete Event Modelling, in Volume 48; - Transformation Rules for Z, in Volume 94;
  • Malik, Robi - Interaction Design for a Mobile Context-Aware System using Discrete Event Modelling, in Volume 48;
  • Malinowski, Elzbieta - A Conceptual Solution for Representing Time in Data Warehouse Dimensions, in Volume 53;
  • Malkin, Michael - Comparison of Texts Streams in the Presence of Mild Adversaries, in Volume 44;
  • Malloy, Brian A. - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
  • Malmi, Lauri - A doctoral course in research methods in computing education research. How should we teach it?, in Volume 88; - How Students Develop Concurrent Programs, in Volume 95; - What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
  • Mammadov, Musa - Effectiveness of Using Quantified Intermarket Influence for Predicting Trading Signals of Stock Markets, in Volume 70;
  • Manderson, Kevin - Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists, in Volume 54;
  • Mandrescu, Eugen - Well-covered Graphs and Greedoids, in Volume 77;
  • Mangan, Peter - On Building Workflow Models for Flexible Processes, in Volume 5;
  • Mann, Samuel - Similarity and originality in code: plagiarism and normal variation in student assignments, in Volume 52; - Software engineering class eating its own tail, in Volume 66;
  • Mannila, Linda - Improving mathematics and programming education - the IMPEd initiative, in Volume 88;
  • Mansuy, Trevor - A Characterization of Wordnet Features in Boolean Models For Text Classification, in Volume 61;
  • Mantoro, Teddy - Location History in a Low-cost Context Awareness Environment, in Volume 21;
  • Maojo, Victor - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
  • Mapelsden, David - Design Pattern Modelling and Instantiation using DPML, in Volume 10;
  • Mar, J. C. - Model-Based Clustering in Gene Expression Microarrays : An Application to Breast Cancer Data, in Volume 19; - On the Simultaneous Use of Clinical and Microarray Expression Data in the Cluster Analysis of Tissue Samples, in Volume 29;
  • March, Verdi - DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids, in Volume 68;
  • Mardaneh, Karim - Modified Global K-Means Algorithm for Clustering in Gene Expression Data Sets, in Volume 73;
  • Margaliot, Adva - A Model for Training Future Science Teachers to Master the Cognitive Skill Melioration with ICT, in Volume 23;
  • Markantonakis, Konstantinos - Countermeasures for Attacks on Satellite TV Cards using Open Receivers, in Volume 44;
  • Markham, Selby - Performance and progression of first year ICT students, in Volume 78;
  • Marquardt, O. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
  • Marriott, Kim - Cobweb : A Constraint-Based WEB Browser, in Volume 16; - Compact Layout of Layered Trees, in Volume 62; - Layout of Bayesian Networks, in Volume 38;
  • Marriott, Kym - Towards Flexible Graphical Communication Using Adaptive Diagrams, in Volume 45;
  • Marshall, Gail - New Wine in Old Bottles or New Wine in New Bottles? Teaching Young Children with Technology , in Volume 34; - The Gifts of Athena: Mindsets, Metaphors and Methods for 21st Century Learning, in Volume 34;
  • Marshall, Stephen - Applying SPICE to e-Learning: An e-Learning Maturity Model?, in Volume 30; - Less Extreme Programming, in Volume 30; - Using a System of Tutorials and Groups to Teach User Interface Design, in Volume 42;
  • Marshall, Stuart - A Web User Interface For An Interactive Software Repository, in Volume 28; - Annotating UI Architecture with Actual Use, in Volume 76; - Aspects to Visualising Reusable Components, in Volume 24; - How (Not) To Help People Test Drive Code, in Volume 7; - Less Extreme Programming, in Volume 30; - Using Remotely Executing Software via a Mobile Device, in Volume 93; - Using Software Visualisation to Enhance Online Component Markets, in Volume 35; - Visualisations of Execution Traces (VET): An Interactive Plugin-Based Visualisation Tool, in Volume 50; - Visualising Reusable Software Over The Web, in Volume 9; - XML Database Support for Program Trace Visualisation, in Volume 35;
  • Marsico, Annalisa - 2D Visualisation of SMFS Data on Membrane Proteins, in Volume 83;
  • Martin, B. J. - Guidance for Def (Aust) 5679 Issue 2, in Volume 100;
  • Martin, Jose I. - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87; - Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
  • Martin, Robin - Semi-Automatic Feature Delineation In Medical Images, in Volume 35;
  • Martinaitis, Paul N. - Stream-Components: Component based Stream computation on the Grid, in Volume 99;
  • Mason, Paul - A Pen-based Paperless Environment for Annotating and Marking Student Assignments, in Volume 50;
  • Mason, Richard - Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework, in Volume 62; - G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework, in Volume 44;
  • Masoodian, Masood - An Empirical Study of Textual and Graphical Travel Itinerary Visualization using Mobile Phones, in Volume 18; - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18; - Visualization of Travel Itinerary Information on PDAs, in Volume 28;
  • Masuda, Sumio - Improvements of TLAESA Nearest Neighbour Search Algorithm and Extension to Approximation Search, in Volume 48;
  • Mathieson, Ian - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26;
  • Mathieson, Luke - The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction, in Volume 38; - The Parameterized Complexity of Regular Subgraph Problems and Generalizations, in Volume 77;
  • Matono, Akiyoshi - A Path-based Relational RDF Database, in Volume 39;
  • Matsubara, Wataru - Testing Square-Freeness of Strings Compressed by Balanced Straight Line Program, in Volume 94;
  • Matsumoto, Ken-ichi - Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
  • Matsumoto, T. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
  • Matsuno, Hiroshi - Integrating Biopathway Databases for Large-scale Modeling and Simulation, in Volume 29;
  • Matsushita, Soichiro - A Wearable Fatigue Monitoring System - Application of Human-Computer Interaction Evaluation, in Volume 50;
  • Matters, Gabrielle - New Basics Pedagogies that Promote Multiliteracies , in Volume 34;
  • Matthews, Iain - Face Refinement through a Gradient Descent Alignment Approach, in Volume 56; - Fast and Accurate Active Appearance Models, in Volume 56;
  • Matzko, Sarah - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
  • Mauw, Sjouke - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
  • Mavers, Diane - Children Drawing Children: Representing an Online Club in Mind Mapping , in Volume 34;
  • May, Lauren - Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98; - Open Trusted Health Informatics Structure (OTHIS), in Volume 80; - Privacy and Security in Open and Trusted Health Information Systems, in Volume 97;
  • Mayer, Nicolas - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
  • Mayes, Keith - Countermeasures for Attacks on Satellite TV Cards using Open Receivers, in Volume 44;
  • Mayo, Michael - Symbol Grounding and its Implications for Artificial Intelligence, in Volume 16;
  • Mayr, Heinrich C. - Conceptual Requirements Modeling - a Contribution to XNP (eXtreme Non Programming), in Volume 53;
  • McAndrew, Alasdair - Teaching image processing using minimal mathematics, in Volume 20;
  • McAullay, Damien - A Delivery Framework for Health Data Mining and Analytics, in Volume 38; - Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
  • McBride, Noelene - New Basics Pedagogies that Promote Multiliteracies , in Volume 34; - Teachers Rethinking Curriculum Approaches within a New Basics Framework , in Volume 34;
  • McBurney, Peter - On Illegal Composition of First-Class Agent Interaction Protocols, in Volume 74;
  • McCallum, John - An Interactive Visualisation for Investigating DNA Sequence Information, in Volume 35; - An Interactive Visualisation for Selecting PCR Primers, in Volume 45;
  • McCance, Gavin - Storage and Data Management in EGEE, in Volume 68;
  • McCarthy, J. - Modelling Smart Security for Classified Rooms with DOVE, in Volume 12;
  • McCarthy, Jim - Hierarchical Verification Environment, in Volume 55;
  • McCartin, Catherine - Bounded Persistence Pathwidth, in Volume 41;
  • McCartney, Robert - What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
  • McComb, Tim - Tracing Information Flow Through Mode Changes, in Volume 48;
  • McCormick, G. Frank - The Agnostic Hazard, in Volume 100;
  • McCullagh, Adrian - An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems, in Volume 81; - Commitment Issues in Delegation Process, in Volume 81;
  • McCulloch, Alan - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
  • McCulloch, Alan F. - BRINet: A BioResource Integration Network, in Volume 29;
  • McDermid, John - A Contract-based Approach to Designing Safe Systems, in Volume 33; - Safety Assurance Contracts for Integrated Modular Avionics, in Volume 33; - The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation, in Volume 47;
  • McDermid, John A. - High Level Failure Analysis for Integrated Modular Avionics, in Volume 3; - Software Safety: Where's the Evidence?, in Volume 3; - Trends in Systems Safety: A European View?, in Volume 15;
  • McDonald, Chris - Dependable Dynamic Source Routing without a Trusted Third Party, in Volume 38; - Establishing Trust In Pure Ad-hoc Networks, in Volume 26; - Kerberos Assisted Authentication in Mobile Ad-hoc Networks, in Volume 26; - Towards Customisable Tuple Field Matching in VLOS, in Volume 16;
  • McDonald, Clement J. - Privacy-Preserving Distributed Queries for a Clinical Case Research Network, in Volume 14;
  • McDonald, John R. - BRINet: A BioResource Integration Network, in Volume 29;
  • McDougall, Anne - Constructionist Learning and Teaching in a Computer Clubhouse Environment, in Volume 23; - Formal and Informal Environments for the Learning and Teaching of Computer Programming, in Volume 23; - Psycles of Change: Development and Implementation of Databased Curriculum Documentation, in Volume 8;
  • McDowall, Janet - Music Technology: New Literacies in the Early Years, in Volume 34;
  • McGavin, Michael - Visualising Reusable Software Over The Web, in Volume 9;
  • McGavin, Mike - Visualisations of Execution Traces (VET): An Interactive Plugin-Based Visualisation Tool, in Volume 50;
  • McGill, Matthew - Graph Drawing Aesthetics and the Comprehension of UML Class Diagrams: An Empirical Study, in Volume 9; - UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
  • McGovern, Jim - CONFER: Towards Groupware for Building Consensus in Collaborative Software Engineering, in Volume 64; - Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures, in Volume 62;
  • McGrath, Mike - Intelligent Visualisation of Social Network Analysis Data, in Volume 2;
  • McIlvenna, Stephen - Synthesis of Orchestrators from Service Choreographies, in Volume 96;
  • McKay, Elspeth - Human-Computer Interaction Closes the Digital Divide: A multicultural, intergenerational ICT case study, in Volume 46;
  • McKay, Judy - The Next Wave of Gender Projects in IT Curriculum and Teaching at Universities, in Volume 52;
  • McKay, R.I. (Bob) - A Comparative Study for Domain Ontology Guided Feature Extraction, in Volume 16;
  • McKenzie, Des - Integration of ICT into the Curriculum at Anderson's Creek Primary School, in Volume 23;
  • McKenzie, Walter - Multiple Intelligences and Instructional Technology , in Volume 34;
  • McKinnon, Alan E. - Visualising the Probability Distribution Function of Uncertain Data - Application to Stochastic Modelling of Ground Water Solute Transport, in Volume 9;
  • McLachlan, G. J. - Clustering Replicated Microarray Data via Mixtures of Random Effects Models for Various Covariance Structures, in Volume 73; - Model-Based Clustering in Gene Expression Microarrays : An Application to Breast Cancer Data, in Volume 19; - On the Simultaneous Use of Clinical and Microarray Expression Data in the Cluster Analysis of Tissue Samples, in Volume 29;
  • McLean, Patrick - Combining Logics for Modelling Security Policies, in Volume 38;
  • McLean, Patrick G. - A Secure Pervasive Environment, in Volume 21;
  • McLeod, Laurie - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
  • McMullan, John - Negligence: Engineering Safety-Critical Systems, in Volume 15;
  • McNally, Myles F. - A Comparison of Different Approaches to the Introductory Programming Course, in Volume 52; - Walking the Grid: Robotics in CS 2, in Volume 52;
  • McNamara, Robyn - Evaluating assessment with competency mapping, in Volume 30;
  • McSporran, Mae - Facilitating Successful Online Computing Courses While Minimising Extra Tutor Workload, in Volume 30;
  • Mehta, Hardik - Implementation of a Triple Modular Redundant FPGA based Safety Critical Systems for Reliable Software Execution, in Volume 69;
  • Mehta, Snehal - Hospital Management Knowledge Discovery using Discrete Event Simulation, in Volume 68;
  • Meikle, Steven R. - Functional Segmentation of Dynamic Emission Tomographic images, in Volume 2; - Non-Invasive estimation of Cerebral Metabolic Rate of Glucose Using Simultaneous Estimation and Cluster Analysis: A feasibility Study, in Volume 2; - Numerical Deconvolution by a Monte Carlo Approach with Application to Dynamic Cardiac Perfusion Tc-99m SPECT, in Volume 11;
  • Meinicke, Larissa - Evaluation of a New Assesment Scheme for a Third-year Concurrency Course, in Volume 66;
  • Meintjes, Peter - Evolution of Relative Synonymous Codon Usage in Human Immunodeficiency Virus Type 1, in Volume 29;
  • Melnikoff, Steve - A Portal for Grid-enabled Physics, in Volume 44;
  • Melser, Peter - Corporate Voices, Personal Voices: The Ethics of the Internet, in Volume 1;
  • Melton, Hayden - Identifying Refactoring Opportunites by Identifying Dependency Cycles, in Volume 48; - Jooj: Real-Time Support For Avoiding Cyclic Dependencies, in Volume 62; - The CRSS Metric for Package Design Quality, in Volume 62;
  • Mendes, Alexandre - Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data, in Volume 38; - The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction, in Volume 38;
  • Mendes, Emilia - Applying the Cognitive Flexibility Theory to Teaching Web Engineering, in Volume 20; - Using Chronological Splitting to Compare Cross- and Single-company Effort Models: Further Investigation, in Volume 91;
  • Mendiratta, Veena B. - Segregated Failures Model for Availability Evaluation of Fault-Tolerant Systems, in Volume 48;
  • Mendling, Jan - On the Correlation between Process Model Metrics and Errors, in Volume 83;
  • Mendoza, Rogan - Ontology Based Object Categorisation for Robots, in Volume 58;
  • Menger, Gisela - Support for Subtyping and Code Re-use in Timor, in Volume 10;
  • Menkhaus, Guido - MUSA-Shadow: Concepts, Implementation and Sample Applications - A Location-Based Service Supporting Multiple Devices, in Volume 10;
  • Menon, Catherine - Towards a Semantic Basis for Rosetta, in Volume 26;
  • Menzies, Alex - Business Process Integration: Method and Analysis, in Volume 96;
  • Merkl, Dieter - An Adaptive Information Retrieval System Based on Associative Networks, in Volume 31; - Improving Domain Ontologies by Mining Semantics from Text, in Volume 31;
  • Merrick, Damian - An ILP for the metro-line crossing problem, in Volume 77; - Graph Interaction through Force-Based Skeletal Animation, in Volume 35; - Increasing the Readability of Graph Drawings with Centrality-Based Scaling, in Volume 60; - Skeletal Animation for the Exploration of Graphs, in Volume 35; - The Metro Map Layout Problem, in Volume 35;
  • Mertens, C. - Analysing MEG-Data by a Combination of Different Neural Networks, in Volume 19;
  • Messig, Michael - Autonomic System Management in Mobile Grid Environments, in Volume 68; - Service Migration in Autonomic Service Oriented Grids, in Volume 82;
  • Meyenn, Andrew - A Proposed Methodology for the Teaching of Information Technology Ethics in Schools, in Volume 1;
  • Meyer, Sven - A Survey of Research on Context-Aware Homes, in Volume 21;
  • Michel, Yann - Approximative Filtering of XML Documents in Publish/Subscribe Systems, in Volume 48; - Event-based Communication for Location-based Service Collaboration, in Volume 92;
  • Mickan, Katherine - Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
  • Middlemiss, M. - A Generic Connectionist-Based Method for On-Line Feature Selection and Modelling with a Case Study of Gene Expression Data Analysis, in Volume 19;
  • Middleton, Gaye L. - Copyright Conundrum - Liability of ISPs for Online Copyright Infringement, in Volume 44;
  • Mikami, Yoshiki - Multilingual ICT Education: Language Observatory as a Monitoring Instrument, in Volume 46;
  • Mildenhall, Greg - An Implementation of Parallel Pattern-Matching via Concurrent Haskell, in Volume 4;
  • Miller, Kerrie M. - Computer-based Collaboration in Student Work: Does a Preference for using Technology Affect Performance?, in Volume 46;
  • Miller, Mirka - An open problem: (4; g)-cages with odd g <= 5 are tightly connected, in Volume 65; - On the Non-existence of Even Degree Graphs with Diameter 2 and Defect 2, in Volume 77; - Security of Statistical Databases: Overview and Future Directions, in Volume 68;
  • Miller, Tim - On Illegal Composition of First-Class Agent Interaction Protocols, in Volume 74;
  • Mingins, Christine A. - Building Trust in Third-party Components using Component Wrappers in the .NET Frameworks, in Volume 10;
  • Mir, Stephan - HOVER: Hybrid On-demand Distance Vector Routing for Wireless Mesh Networks, in Volume 74;
  • Miret, J. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
  • Miskell, Craig - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
  • Misra, Manoj - OCP - A Distributed Real Time Commit Protocol, in Volume 49;
  • Misue, Kazuo - Drawing Bipartite Graphs as Anchored Maps, in Volume 60; - FindFlow: Visual Interface for Information Search based on Intermediate Results, in Volume 60; - Generation of Relevance Maps and Navigation in A Digital Book, in Volume 60; - Information Gathering Support Interface by the Overview Presentation of Web Search Results, in Volume 60; - NeL2: Network Drawing Tool for Handling Layered Structured Network Diagram, in Volume 60; - Ripple Presentation for Tree Structures with Historical Information, in Volume 60;
  • Mitchell, Brice - Modelling and Initial Analysis of Operational Planning Processes using Coloured Petri Nets, in Volume 12;
  • Mitchell, Geoff - Applying SPICE to e-Learning: An e-Learning Maturity Model?, in Volume 30;
  • Mitchell, Ian - An Exploration of Internal Factors Influencing Student Learning of Programming, in Volume 95;
  • Mitchell, Jason - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
  • Mitchell, Margaret - Creating Minimal Vertex Series Parallel Graphs from Directed Acyclic Graphs., in Volume 35; - Use of Directed Acyclic Graph Analysis in Generating Instructions for Multiple Users, in Volume 9; - Use of Series Parallel Digraph Analysis in Generating Instructions for Multiple Users, in Volume 2;
  • Mitchell, Phillip E. - Newspaper Document Analysis Featuring Connected Line Segmentation, in Volume 11;
  • Mitchell, Simon - Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20;
  • Mitchelson, Keith R. - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
  • Mitri, George - Automatic Music Classification Problems, in Volume 26;
  • Miura, Kazuyuki - Rectangle-of-Influence Drawings of Four-Connected Plane Graphs, in Volume 45;
  • Miura, Takao - Clustering Stream Data by Regression Analysis, in Volume 32;
  • Miyano, Eiji - Graph Classes and the Complexity of the Graph Orientation Minimizing the Maximum Weighted Outdegree, in Volume 77; - Graph Orientation Algorithms to Minimize the Maximum Outdegree, in Volume 51;
  • Miyano, Satoru - Integrating Biopathway Databases for Large-scale Modeling and Simulation, in Volume 29;
  • Miyoshi, Hiroyuki - From Reflection to Interaction: An Indirect Approach to the Philosophy of Computation, in Volume 37;
  • Mlynkova, Irena - On Inference of XML Schema with the Knowledge of an Obsolete One, in Volume 92; - UserMap : an Adaptive Enhancing of User-Driven XML-to-Relational Mapping Strategies, in Volume 75;
  • Mocker, Martin - Development of an Electronic Commerce Portal System using a Specific Software Development Process, in Volume 10;
  • Moelans, Bart - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83;
  • Moffat, Alistair - Enhanced Word-Based Block-Sorting Text Compression, in Volume 4; - Improved Retrieval Effectiveness Through Impact Transformation, in Volume 5; - Index Compression Using Fixed Binary Codewords, in Volume 27; - Lossless Image Compression Using Pixel Reordering, in Volume 26; - Making Connections: First Year Transition for Computer Science and Software Engineering Students, in Volume 42; - Performance and Cost Tradeoffs in Web Search, in Volume 27; - Score Aggregation Techniques in Retrieval Experimentation, in Volume 92; - What Drives Curriculum Change?, in Volume 30;
  • Mogin, Pavle - S.E.A.L. - A Query Language for Entity-Association Queries, in Volume 92;
  • Mohay, George - Distributed intrusion detection in clusters based on non-interference, in Volume 54; - Synapse: Auto-correlation and Dynamic Attack Redirection in an Immunologically-inspired IDS, in Volume 54;
  • Molla-Aliod, Diego - Natural Language Processing in the Undergraduate Curriculum, in Volume 20;
  • Molle, Mart - TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
  • Monahan, Rosemary - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
  • Monden, Akito - A Framework for Obfuscated Interpretation, in Volume 32; - Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
  • Monk, Andrew F. - Simple, social, ethical and beautiful : requirements for UIs in the home, in Volume 76;
  • Monostori, Krisztian - Signature Extraction for Overlap Detection in Documents, in Volume 4; - Suffix Vector: Space- and Time-Efficient Alternative to Suffix Trees, in Volume 4;
  • Monsifrot, Antoine - A Framework for Obfuscated Interpretation, in Volume 32;
  • Montague, Paul - Translation of Rights Expressions, in Volume 44;
  • Moon, ChanHo - Deferred Incremental Refresh of XML Materialized Views : Algorithms and Performance Evaluation, in Volume 17;
  • Mooney, Carl H. - Marking Time in Sequence Mining, in Volume 61;
  • Moreno, Andres - Con�ictive animations as engaging learning tools, in Volume 88;
  • Morgan, Alex - Student Teachers' Experiences and Attitudes Towards Using Interactive Whiteboards in the Teaching and Learning of Young Children, in Volume 34;
  • Morozova, Elena - A Multidimensional Bisection Method for Unconstrained Minimization Problem, in Volume 77;
  • Morris, John - A Generalised Spreadsheet Verification Methodology, in Volume 4; - Algorithm Animation: Using the Algorithm Code to Drive the Animation, in Volume 42; - Determining Component Reliability Using a Testing Index, in Volume 4;
  • Morris, Peter - Constructing Strictly Positive Families, in Volume 65;
  • Morris, Sidney - Effectiveness of Using Quantified Intermarket Influence for Predicting Trading Signals of Stock Markets, in Volume 70;
  • Morrison, Evan D. - Business Process Integration: Method and Analysis, in Volume 96;
  • Morrison, Ron - Implementing a Family of Distributed Garbage Collectors, in Volume 16; - Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
  • Morrow, Yvonne - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
  • Moscato, Pablo - Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data, in Volume 38; - The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction, in Volume 38;
  • Moskwa, Sam - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
  • Mossakowski, Till - Heterogeneously Structured Ontologies - Integration, Connection, and Refinement, in Volume 90;
  • Motahari-Nezhad, Hamid Reza - ServiceMosaic Project: Modeling, Analysis and Management of Web Services Interactions, in Volume 53;
  • Motoyoshi, Masahiro - Clustering Stream Data by Regression Analysis, in Volume 32;
  • Motroen, Lasse - Towards a Definition and Model for Metadata File Systems, in Volume 74;
  • Moulder, Peter - Cobweb : A Constraint-Based WEB Browser, in Volume 16; - Layout of Bayesian Networks, in Volume 38;
  • Mousset, Eric C. - The Open Source Singularity: A Postmodernist View, in Volume 37;
  • Moyle, Michael - The Design and Evaluation of a Flick Gesture for 'Back' and 'Forward' in Web Browsers, in Volume 18;
  • Mu, Yi - A Secure Mental Poker Protocol over the Internet, in Volume 21; - Mitigating Phishing with ID-based Online/Offline Authentication, in Volume 81;
  • Muecke, Nial - An Argument Structure Abstraction for Bayesian Belief Networks: Just Outcomes in On-line Dispute Resolution, in Volume 67;
  • Mueller-Tomfelde, Christian - Explicit Task Representation based on Gesture Interaction, in Volume 57;
  • Mueller, Wolfgang - Enhancing the Visualization Process with Principal Component Analysis to Support the Exploration of Trends, in Volume 60;
  • Muguerza, Javier - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87; - Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
  • Mui, Y.C. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
  • Muir, Peter - Transforming learning of programming: a mentoring project, in Volume 78;
  • Mujuni, Egbert - Parameterized Complexity of the Clique Partition Problem, in Volume 77;
  • Munro, Callum - Using Machinima to Promote Computer Science Study, in Volume 93;
  • Munro, Dave - Implementing a Family of Distributed Garbage Collectors, in Volume 16;
  • Munro, David - A Domain Specific Language for Execution Profiling and Regulation, in Volume 91;
  • Munro, David S. - Easing the Transition: A Collaborative Learning Approach, in Volume 95; - Garbage Collection for Storage-Oriented Clusters, in Volume 26;
  • Muramatsu, D. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
  • Murata, Tadao - Modelling and Simulation of Routing Protocol for Mobile Ad Hoc Networks Using Coloured Petri Nets, in Volume 12;
  • Murdaca, Clara - A Relational Account of Objects, in Volume 48;
  • Murdoch, John - Measuring Safety: Applying PSM to the System Safety Domain, in Volume 33;
  • Murga, Leonel F. - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
  • Murnane, John S. - An Empirical Study of Junior Secondary Students' Expression of Algorithms in Natural Language, in Volume 8; - Teaching Teaching with Information Technology, in Volume 23;
  • Murphy, Eamonn - Segregated Failures Model for Availability Evaluation of Fault-Tolerant Systems, in Volume 48;
  • Murray, Alex - PULSE: a Pluggable User-space Linux Security Environment paper, in Volume 81;
  • Murray, Colin - A User-based Evaluation of Skeletal Animation Techniques in Graph Interaction, in Volume 45; - Graph Interaction through Force-Based Skeletal Animation, in Volume 35; - Visualisation of Satisfiability using the Logic Engine, in Volume 45;
  • Murray, D. Wayne - Mining Medical Specialist Billing Patterns for Health Service Management, in Volume 87;
  • Murray, Iain - A Computing Education Vision for the Sight Impaired, in Volume 30;
  • Murray, Leesa - An Approach to Specifying Software Frameworks, in Volume 26;
  • Murthy, Sudarshan - Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE, in Volume 31;
  • Murty, James - Implementing Role Based Access Control for Federated Information Systems on the Web, in Volume 21;
  • Musial, Benjamin - Application of Focus + Context to UML, in Volume 24;
  • Muthuvelu, Nithiapidary - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
  • Myers, Trina S. - Supporting Coral Reef Ecosystems Research through Modelling Re-usable Ontologies, in Volume 90; - The Semantic Reef: Managing Complex Knowledge to Predict Coral Bleaching on the Great Barrier Reef, in Volume 68;
  • Myller, Niko - Con�ictive animations as engaging learning tools, in Volume 88;
Top of List

N

  • Naemura, Masahide - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
  • Nagamochi, Hiroshi - Minimum Cost Source Location Problem with Local 3-Vertex-Connectivity Requirements, in Volume 41;
  • Nagappan, Rajehndra - A Graph Based Model for Navigating Visualisation, in Volume 2;
  • Nagarajan, Srivalli - Towards understanding the non-technical work experiences of recent Australian information technology graduates, in Volume 78;
  • Nagasaki, Masao - Integrating Biopathway Databases for Large-scale Modeling and Simulation, in Volume 29;
  • Nagashima, Kan - A Wearable Fatigue Monitoring System - Application of Human-Computer Interaction Evaluation, in Volume 50;
  • Naghdy, Fazel - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
  • Nagra, Jasvir - A Functional Taxonomy for Software Watermarking, in Volume 4; - Tamper-proofing Software Watermarks, in Volume 32;
  • Naik, Ganesh R. - Hand gestures for HCI using ICA of EMG, in Volume 56;
  • Naish, Lee - A Program Transformation for Debugging Haskell 98, in Volume 16; - Approximating the Success Set of Logic Programs Using Constrained Regular Types, in Volume 16;
  • Nakamura, Kensuke - Toward Building Grid Applications in Bioinformatics, in Volume 54;
  • Nakamura, Masahide - Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
  • Nakanishi, Takafumi - Visualization of Music Impression in Facial Expression to Represent Emotion, in Volume 53;
  • Nakayama, Minoru - Assessing Usability for Input Operation using Frequency Components of Eye Movements, in Volume 93; - System Usability Evaluation for Input Operation using Oculo-motors, in Volume 64;
  • Nakazawa, Koji - Type Checking and Inference for Polymorphic and Existential Types, in Volume 94;
  • Nakazono, Nagayoshi - NeL2: Network Drawing Tool for Handling Layered Structured Network Diagram, in Volume 60;
  • Nam, Ki-Chol - Visual Narratives: The Essential Role of Imagination in the Visualization Process, in Volume 60;
  • Nascimento, Hugo A. D. do - The Metro Map Layout Problem, in Volume 35;
  • Natsev, Apostol (Paul) - Aggregate Predicate Support in DBMS, in Volume 5;
  • Natwichai, Juggapong - A Reconstruction-based Algorithm for Classification Rules Hiding, in Volume 49; - Data Reduction Approach for Sensitive Association Classification Rule Hiding, in Volume 75;
  • Nayak, Abhaya - Approaches for Semantic Interoperability between Domain Ontologies, in Volume 72; - DASMAS - Dialogue based Automation of Semantic interoperability in Multi Agent Systems, in Volume 58;
  • Nayak, Richi - A Case Study of Failure Mode Analysis with Text Mining Methods, in Volume 84; - Clustering and Classification of Maintenance Logs using Text Data Mining, in Volume 87; - Combining Structure and Content Similarities for XML Document Clustering, in Volume 87; - Data Mining For Lifetime Prediction of Metallic Components, in Volume 61; - Data Mining in Conceptualising Active Ageing, in Volume 61; - PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees, in Volume 70; - Temporal Pattern Matching for the Prediction of Stock Prices, in Volume 84; - The Use of Various Data Mining and Feature Selection Methods in the Analysis of a Population Survey Dataset, in Volume 84;
  • Ndukwu, Ukachukwu - Reasoning about a Distributed Probabilistic System, in Volume 94;
  • Necasky, Martin - Reverse Engineering of XML Schemas to Conceptual Diagrams, in Volume 96; - XSEM - A Conceptual Model for XML, in Volume 67;
  • Nee, A.Y.C. - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
  • Nelson, Chris - Game/Music Interaction - An Aural Interface for Immersive Interactive Environments, in Volume 64;
  • Nepal, Surya - A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases, in Volume 5; - Role of Edge Detection in Video Semantics, in Volume 22;
  • Nesbitt, Keith - Multi-sensory Game Interface Improves Player Satisfaction but not Performance, in Volume 76;
  • Nesbitt, Keith V. - Developing Gestalt-based Design Guidelines for Multi-sensory Displays, in Volume 57; - Identifying risks for cross-disciplinary higher degree research students, in Volume 78; - Modelling Human Perception to Leverage the Reuse of Concepts across the Multi-sensory Design Space, in Volume 53; - Modelling the Multi-Sensory Design Space, in Volume 9; - The Gestalt Principles of Similarity and Proximity Apply to Both the Haptic and Visual Grouping of Elements, in Volume 64; - Using Guidelines to assist in the Visualisation Design Process, in Volume 45;
  • Neuhauser, Markus - Nonparametric Approaches to Detecting Differentially Expressed Genes in Replicated Microarray Experiments, in Volume 29;
  • Neumann, Gunter - Mining Web Snippets to Answer List Questions, in Volume 84;
  • Neumann, Gustaf - On the Correlation between Process Model Metrics and Errors, in Volume 83;
  • Neumayr, Bernd - Multi-Level Domain Modeling with M-Objects and M-Relationships, in Volume 96;
  • Neverov, Gregory - Towards a Fully-reflective Meta-programming Language, in Volume 38;
  • Nevison, Chris - Using a Maze Case Study to Teach Object-Oriented Programming and Design Patterns, in Volume 30;
  • Newby, Steve - Extending a Persistent Object Framework to Enhance Enterprise Application Server Performance, in Volume 5;
  • Newman, Ian - Open Ended Group Projects a 'Tool' for More Effective Teaching, in Volume 20;
  • Ng, S. K. - Clustering Replicated Microarray Data via Mixtures of Random Effects Models for Various Covariance Structures, in Volume 73;
  • Ng, S. W. - Clustering Replicated Microarray Data via Mixtures of Random Effects Models for Various Covariance Structures, in Volume 73;
  • Ng, See-Kiong - From Informatics to Bioinformatics, in Volume 19; - Whole-Genome Functional Classification of Genes by Latent Semantic Analysis on Microarray Data, in Volume 29;
  • Ng, Vincent - Enumerating XML Data for Dynamic Updating, in Volume 39; - Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries, in Volume 63;
  • Ng, Wee-Keong - CrystalBall : A Framework for Mining Variants of Association Rules, in Volume 17; - Discovering Frequent Sets from Data Streams with CPU Constraint, in Volume 70;
  • Ngai, Alwin C.H. - Enhanced Word-Based Block-Sorting Text Compression, in Volume 4;
  • Nguyen, Anh - A BDI Agent Architecture for Dialogue Modelling and Coordination in a Smart Personal Assistant, in Volume 57; - Document Classification via Structure Synopses, in Volume 17;
  • Nguyen, Anthony - Characterizing Image Properties for Digital Mammograms, in Volume 97;
  • Nguyen, DucDung - Knowledge Visualization in Hepatitis Study, in Volume 60;
  • Nguyen, Minh H. - On the Non-existence of Even Degree Graphs with Diameter 2 and Defect 2, in Volume 77;
  • Nguyen, Peter - A Domain Specific Language for Execution Profiling and Regulation, in Volume 91;
  • Nguyen, Philip H. P. - A Formalization of Subjective and Objective Time Ontologies, in Volume 85;
  • Nguyen, Phung Hua - Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading, in Volume 38; - Strength Reduction for Loop-Invariant Types, in Volume 26;
  • Nguyen, Phuong - Characterizing Image Properties for Digital Mammograms, in Volume 97;
  • Nguyen, Quang Vinh - Improvements of Space-Optimized Tree for Visualizing and Manipulating Very Large Hierarchies, in Volume 22; - Visualising File-Systems Using ENCCON Model, in Volume 36;
  • Nguyen, Son N. - A Further Study in the Data Partitioning Approach for Frequent Itemsets Mining, in Volume 49; - Graph Mining based on a Data Partitioning Approach, in Volume 75;
  • Nguyen, T. A. - An Approach to Vickrey-based Resource Allocation in the Presence of Monopolistic Sellers, in Volume 99;
  • Nguyen, Thai D. - Ontology Evolution for Customer Services, in Volume 90;
  • Ni, Jiarui - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
  • Ni, Wei - Update XML Data by Using Graphical Languages, in Volume 83;
  • Nicholson, Ann E. - Take Heart II: A Modular Bayesian Decision Support System, in Volume 68;
  • Nicholson, Mark - Safety Assurance Contracts for Integrated Modular Avionics, in Volume 33;
  • Nicolau�Jr., Dan V. - A New Program to Compute the Surface Properties of Biomolecules, in Volume 19;
  • Nicolau Jr., Dan V. - Towards a Theory of Protein Adsorption: Predicting the Adsorption of Proteins on Surfaces via a Piecewise Linear Model, in Volume 29;
  • Nicolau�Sr., Dan V. - A New Program to Compute the Surface Properties of Biomolecules, in Volume 19;
  • Nicolau, Dan V. - Towards a Theory of Protein Adsorption: Predicting the Adsorption of Proteins on Surfaces via a Piecewise Linear Model, in Volume 29;
  • Niedieck, S. - Analysing MEG-Data by a Combination of Different Neural Networks, in Volume 19;
  • Nielsen, Benny K. - An efficient solution method for relaxed variants of the nesting problem, in Volume 65;
  • Nieto, Juan Manuel Gonzalez - Strong Designated Verifier Signature in a Multi-user Setting, in Volume 98;
  • Nieto, Juanma Gonzalez - Provably Secure Key Exchange: an Engineering Approach, in Volume 21;
  • Nieuwenhuis, Adrienne L. - Application Rates to Undergraduate Programs in Information Technology in Australian Universities, in Volume 4;
  • Nikandros, George - Calculating Train Braking Distance, in Volume 3; - COTS - Size Does Matter, in Volume 47; - Measuring Railway Signals Passed At Danger, in Volume 86;
  • Nikolov, Nikola - Using Spring Algorithms to Remove Node Overlapping, in Volume 45;
  • Nikolov, Nikola S. - Layered Drawings of Directed Graphs in Three Dimensions, in Volume 45;
  • Nilsen, Trond - Interaction With Partially Transparent Hands And Objects, in Volume 40;
  • Nimbhorkar, Prajakta - Longest Paths in Planar DAGs in Unambiguous Logspace, in Volume 94;
  • Nisar, Azhar - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
  • Nishio, Shojiro - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
  • Nishizeki, Takao - Rectangle-of-Influence Drawings of Four-Connected Plane Graphs, in Volume 45;
  • Noah, Shahrul Azman - Extracting and Modeling the Semantic Information Content of Web Documents to Support Semantic Document Retrieval, in Volume 96;
  • Noble, James - A Case for Iconic Icons, in Volume 50; - A Case Study of Cartoon Visualisation Using AspectJ, in Volume 24; - A Lightweight Web-Based Case Tool for UML Class Diagrams, in Volume 18; - A Taxonomic Analysis of User-Interface Metaphors in the Microsoft Office Project Gallery, in Volume 40; - A Web User Interface For An Interactive Software Repository, in Volume 28; - Attack of the Clones, in Volume 13; - Clicki: A Framework for Light-weight Web-based Visual Applications, in Volume 40; - Delegation Diagrams: Visual Support for the Development of Object-Oriented Designs, in Volume 28; - Essential Use Cases and Responsibility in Object-Oriented Development, in Volume 4; - From Pushing Buttons to Play and Progress: Value and Interaction in Fable, in Volume 50; - Icons R Icons, in Volume 18; - InspectJ : Program Monitoring for Visualisation Using AspectJ, in Volume 16; - Less Extreme Programming, in Volume 30; - Metaphor and Metonymy in Object-Oriented Design Patterns, in Volume 4; - Patterns for Essential Use Case Bodies, in Volume 13; - Persuasive Interaction for Collectivist Cultures, in Volume 50; - Postmodern Prospects for Conceptual Modelling, in Volume 53; - Program Visualisation for Visual Programs, in Volume 7; - Reflections on CRC Cards and OO Design, in Volume 10; - Sokoban: A System Object Case Study, in Volume 10; - Spreadsheet structure inspection using low level access and visualisation, in Volume 18; - Spreadsheet Visualisation to Improve End-user Understanding, in Volume 24; - Teaching the Evaluation of Object-Oriented Designs, in Volume 20; - The Semiotics of User Interface Redesign, in Volume 40; - Using a System of Tutorials and Groups to Teach User Interface Design, in Volume 42; - Using Software Visualisation to Enhance Online Component Markets, in Volume 35; - Visualising 1,051 Visual Programs Module Choice and Layout in the Nord Modular Patch Language, in Volume 9; - XML Database Support for Program Trace Visualisation, in Volume 35;
  • Noble, Nathan - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
  • Nocke, Thomas - A Framework for Visual Data Mining of Structures, in Volume 48; - Enhancing the Visualization Process with Principal Component Analysis to Support the Exploration of Trends, in Volume 60;
  • Nolan, M. - An Evaluation of Web Services in the Design of a B2B Application, in Volume 26;
  • Norcross, Stuart - Implementing a Family of Distributed Garbage Collectors, in Volume 16;
  • Notoatmodjo, Gilbert - Passwords and Perceptions, in Volume 98;
  • Nouali, Nadia - A Two-Phase Commit Protocol for Mobile Wireless Environment, in Volume 39;
  • Novins, Kevin - Fluid Sketching of Directed Graphs, in Volume 50;
  • Nowak, Chris - Mephisto I. - Towards a Formal Theory, in Volume 72;
  • Nussbaum, Doron - Calculating the Meeting Point of Scattered Robots on Weighted Terrain Surfaces, in Volume 41;
  • Nutt, Werner - Condensative Stream Query Language for Data Streams, in Volume 63;
  • Nymeyer, Albert - Formal Model of a Protocol Converter, in Volume 94;
Top of List

O

  • O'Brien, Mia B. - Identifying Salient Learning Experiences: A Scenario-Based Method Enabling Industry-University Partnerships in IT, in Volume 20;
  • O'Dea, Damian - Dealing with Geospatial Information in the Semantic Web, in Volume 58;
  • O'Hare, G. M. P. - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
  • O'Rourke, Maureen - The Introduction of New Technologies - New Possibilities, Partnerships and Power Relationships , in Volume 34;
  • Oberweis, Andreas - Measuring Similarity between Semantic Business Process Models, in Volume 67;
  • Odgers, Grant - Evaluating Swiftpoint as a Mobile Device for Direct Manipulation Input, in Volume 64;
  • Oertel, Karina - Emotions in HCI - An Affective E-Learning System, in Volume 56;
  • Ofoghi, Bahadorreza - A Semantic Approach to Boost Passage Retrieval Effectiveness for Question Answering, in Volume 48;
  • Ogawa, Michael - BiblioViz: A System for Visualizing Bibliography Information, in Volume 60;
  • Ohbo, Nobuo - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
  • Ohiwa, Hajime - Roles of the Teacher in Media Literacy Education, in Volume 23;
  • Ohrimenko, Olga - Modelling for Lazy Clause Generation, in Volume 77;
  • Ohta, Manabu - An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories, in Volume 39;
  • Okamoto, Yoshio - Fast Exponential-Time Algorithms for the Forest Counting in Graph Classes, in Volume 65;
  • Oliveira, Stanley R. M. - Foundations for an Access Control Model for Privacy Preservation in Multi-Relational Association Rule Mining, in Volume 14; - Privacy Preserving Frequent Itemset Mining, in Volume 14;
  • Oliver, Dave - This Course Has A Bloom Rating Of 3.9, in Volume 30;
  • Omondi, Amos - Embedding of Fault-Tolerant Trees in the Josephus Cube, in Volume 6;
  • Omote, Hiroki - Method for Drawing Intersecting Clustered Graphs and Its Application to Web Ontology Language, in Volume 60;
  • Ondrechen, Mary Jo - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
  • Ong, Hwee-Leng - Feature Space Transformation and Decision Results Interpretation, in Volume 19;
  • Ong, Kenneth - Mesh Simplification using Ellipsoidal Schema for Isotropic Quantization of Face-Normal Vectors, in Volume 60;
  • Ong, Kok-Leong - CrystalBall : A Framework for Mining Variants of Association Rules, in Volume 17; - Discovering Frequent Sets from Data Streams with CPU Constraint, in Volume 70; - Safely Delegating Data Mining Tasks, in Volume 61;
  • Ong, S.K. - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
  • Ong, Twee-Hee - BLAST++ : A Tool for BLASTing Queries in Batches, in Volume 19;
  • Ong, Yew-Soon - Whole-Genome Functional Classification of Genes by Latent Semantic Analysis on Microarray Data, in Volume 29;
  • Ono, Hirotaka - Graph Classes and the Complexity of the Graph Orientation Minimizing the Maximum Weighted Outdegree, in Volume 77; - Graph Orientation Algorithms to Minimize the Maximum Outdegree, in Volume 51;
  • Ooi, Beng Chin - B-trees: Bearing Fruits of All Kinds, in Volume 5; - BLAST++ : A Tool for BLASTing Queries in Batches, in Volume 19; - Can P2P become a disruptive technology to enterprise data processing?, in Volume 75;
  • Ore, Christian-Emil - The CIDOC Conceptual Reference Model - A New Standard for Knowledge Sharing, in Volume 83;
  • Orengo, Viviane Moreira - SimEval - A Tool for Evaluating the Quality of Similarity Functions, in Volume 83;
  • Orgun, Bhavna - Approaches for Semantic Interoperability between Domain Ontologies, in Volume 72; - DASMAS - Dialogue based Automation of Semantic interoperability in Multi Agent Systems, in Volume 58;
  • Orgun, Mehmet A. - A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors, in Volume 16; - Compiled Visual Programs by VisPro, in Volume 36; - Towards Security Labelling, in Volume 48; - Using Graph Grammer to Implement Global Layout for a Visual Programming Language Generation System, in Volume 11; - Visual Language Semantics Specification in the VisPro System, in Volume 22;
  • Orlowska, Maria E. - A Further Study in the Data Partitioning Approach for Frequent Itemsets Mining, in Volume 49; - A Reconstruction-based Algorithm for Classification Rules Hiding, in Volume 49; - Customizing Internal Activity Behaviour for Flexible Process Enforcement, in Volume 27; - Data Flow and Validation in Workflow Modelling, in Volume 27; - Graph Mining based on a Data Partitioning Approach, in Volume 75; - On Aggregation Issues in Spatial Data Management, in Volume 5; - Recency-Based Collaborative Filtering, in Volume 49;
  • Ortuno, Fernando Martinez - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
  • Osawa, Ryo - Puzzle Generators and Symmetric Puzzle Layout, in Volume 45;
  • Osman, Deanna - Using Corpus Analysis to Inform Research into Opinion Detection in Blogs, in Volume 70;
  • Osman, Deanna J. - Opinion Search in Web Logs, in Volume 63;
  • Ou, Yuming - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
  • Oudshoorn, Michael J. - AdJava - Automatic Distribution of Java Applications, in Volume 4; - Employing Hierarchical Federation Communities in the Virtual Ship Architecture, in Volume 4;
  • Ouyang, Hua - A New Lip Feature Representation Method for Video-based Bimodal Authentication, in Volume 57;
  • Ovchinnikova, Ekaterina - Aspects of Automatic Ontology Extension: Adapting and Regeneralizing Dynamic Updates, in Volume 72; - Extraction, evaluation and integration of lexical-semantic relations for the automated construction of a lexical ontology, in Volume 85;
  • Over, Andrew - Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU, in Volume 62;
  • Oviatt, Sharon - Toward Adaptive Information Fusion in Multimodal Systems, in Volume 57;
  • Ozgul, Fatih - Mining for offender group detection and story of a police operation, in Volume 70;
  • Ozolins, Jason - Integrating The MACHO Data-set with the Virtual Observatory, in Volume 44;
  • Ozols, Maris - Access Control Models and Security Labelling, in Volume 62;
  • Ozols, Maris A. - Combining Logics for Modelling Security Policies, in Volume 38;
Top of List

P

  • Paar, Alexander - A Pluggable Architectural Model and a Formally Specified Programming Language Independent API for an Ontological Knowledge Base Server, in Volume 58;
  • Padgham, Lin - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26; - Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids, in Volume 4; - Experiences in Teaching Computing Theory via Aspects of Problem-based Learning, in Volume 20; - Representation and Reasoning for Goals in BDI Agents, in Volume 4;
  • Padmanabhan, Vineet - Process Modelling: The Deontic Way, in Volume 53; - Using a Temporal Constraint Network for Business Process Execution, in Volume 49;
  • Paganelli, F. - Automating XML document Transformations: A conceptual modelling based approach, in Volume 31;
  • Page, John - A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios, in Volume 32;
  • Pagnucco, Maurice - Utilising Ontological Structure for Reasoning with Preferences, in Volume 90;
  • Pai, Tun-Wen - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
  • Pailthorpe, Bernard - 3D Visualisation of Tumours and Blood Vessels in Human Liver, in Volume 22; - Grid services for e-archaeology, in Volume 82; - High Resolution Scalable Displays: Manufacturing and Use, in Volume 35; - Semi-Automatic Feature Delineation In Medical Images, in Volume 35;
  • Paine, Lance - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
  • Palaniswam, Marimuthu - Hand gestures for HCI using ICA of EMG, in Volume 56;
  • Palmer, Doug - Applying Enterprise Architectures and Technology to the Embedded Devices Domain, in Volume 21;
  • Palopoli, Luigi - A Framework for Improving Protein Structure Predictions by Teamwork, in Volume 19;
  • Palsberg, Jens - Register Allocation via Coloring of Chordal Graphs, in Volume 65;
  • Panach, Ignacio - An Abstract Interaction Model for a MDA Software Production Method, in Volume 83;
  • Pang, Y. - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
  • Pankratius, Victor - A Formal Foundation for Workflow Composition, Workflow View Definition, and Workflow Normalization based on Petri Nets, in Volume 43;
  • Pantelic, R. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
  • Papadopoulos, Yiannis - A Method and Tool Support for Model-based Semi-automated Failure Modes and Effects Analysis of Engineering Designs, in Volume 47;
  • Parameswaran, N. - Media Streaming Synchronisation and Video Interaction : A Survey, in Volume 22; - Survey of Sports Video Analysis: Research Issues and Applications, in Volume 36;
  • Paris, Cecile - Explicit Task Representation based on Gesture Interaction, in Volume 57;
  • Park, Mira - Automatic Extraction of Lung Boundaries by a Knowledge-Based Method, in Volume 2; - Detection and Measurement of Hilar Region in Chest Radiograph, in Volume 22; - Detection of Abnormal Texture in Chest X-rays with Reduction of Ribs, in Volume 36; - Texture Classification using Multi-Scale Scheme, in Volume 36;
  • Park, Sung Sik - Using Formal Concept Analysis with an Incremental Knowledge Acquisition System for Web Document Management, in Volume 48;
  • Parker, Brian - Three-dimensional Medical Image Segmentation Using a Graph-Theoretic Energy-Minimisation Approach, in Volume 11; - Variational Segmentation and PCA Applied to Dynamic PET Analysis, in Volume 22;
  • Parker, David - A Method and Tool Support for Model-based Semi-automated Failure Modes and Effects Analysis of Engineering Designs, in Volume 47;
  • Parker, Kris - Determining Component Reliability Using a Testing Index, in Volume 4;
  • Parnas, David L. - Segregated Failures Model for Availability Evaluation of Fault-Tolerant Systems, in Volume 48;
  • Parnis, James - Exploiting FPGA Concurrency to Enhance JVM Performance, in Volume 26;
  • Parry, David - A Fuzzy Ontology for Medical Document Retrieval, in Volume 32;
  • Parsa, Mahdi - Computing Nash Equilibria Gets Harder: New Results Show Hardness Even for Parameterized Complexity, in Volume 94;
  • Parsons, Dale - Parson's Programming Puzzles: A Fun and Effective Learning Tool for First Programming Courses, in Volume 52;
  • Parsons, Jeffrey - An Experimental Evaluation of Property Precedence in Conceptual Modelling, in Volume 31; - Ontological Semantics for the Use of UML in Conceptual Modeling, in Volume 83;
  • Paschos, Vangelis Th. - Greedy algorithms for on-line set-covering and related problems, in Volume 51;
  • Pascoe, Robert - Experiences from a Wireless-enabled Tablet Classroom, in Volume 42;
  • Passig, David - A Model for Training Future Science Teachers to Master the Cognitive Skill Melioration with ICT, in Volume 23;
  • Pastor, Oscar - An Abstract Interaction Model for a MDA Software Production Method, in Volume 83;
  • Pasupathinathan, Vijayakrishnan - Formal Analysis of Card-based Payment Systems in Mobile devices, in Volume 54; - Formal Security Analysis of Australian E-passport Implementation, in Volume 81;
  • Patig, Susanne - A Practical Guide to Testing the Understandability of Notations, in Volume 79;
  • Patrick, Jon - An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology, in Volume 68; - Extracting Semantics in a Clinical Scenario, in Volume 68; - Metonymic and Holonymic roles and Emergent Properties in the SNOMED CT Ontology, in Volume 72; - Scamseek - A Language Technology Project Fulfilling Research Objectives with Industrial Obligations, in Volume 46;
  • Patrickson, Margaret - GP Attitudes towards Using HI Systems in Their Professional Role, in Volume 97;
  • Patterson, Julia - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
  • Pattison, Tim - Information Visualisation using Composable Layouts and Visual Sets, in Volume 9; - Rapid Assembly and Deployment of Domain Visualisation Solutions, in Volume 9; - View Coordination Architecture for Information Visualisation, in Volume 9;
  • Patton, Mary Anne - User Interface Requirements for Authentication of Communication, in Volume 18;
  • Pau, Cristian - XAL: An Algebra For XML Query Optimization, in Volume 5;
  • Pauling, Joel W. - Review of Work Experience in a Bachelor of Information Technology, in Volume 66;
  • Pavlovski, Christopher J. - Non-Functional Requirements in Business Process Modeling, in Volume 79;
  • Payan, Donald G. - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
  • Paynter, John - Adventure Cycles A Software Engineering Approach, in Volume 30;
  • Pearce, David - Edge-Selection Heuristics for Computing Tutte Polynomials, in Volume 94;
  • Pears, Arnold - Differing Ways that Computing Academics Understand Teaching, in Volume 66; - Five Myths of Assessment, in Volume 30; - Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78; - Multi-Institutional Teaching Communities in Computer Education, in Volume 52; - Qualitative Research Projects in Computing Education Research: An Overview, in Volume 52; - What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
  • Pears, Russel - Rare Association Rule Mining via Transaction Clustering, in Volume 87;
  • Pedersen, Dennis - A Powerful and SQL-Compatible Data Model and Query Language for OLAP, in Volume 5;
  • Pedersen, Torben Bach - A Powerful and SQL-Compatible Data Model and Query Language for OLAP, in Volume 5;
  • Peixoto, Paulo - Nuisance Free Recognition of Hand Postures Over a Tabletop Display, in Volume 56;
  • Pellegrino, Francois - Accuracy Estimation With Clustered Dataset, in Volume 61;
  • Pellens, Bram - Conceptual Modeling for Virtual Reality, in Volume 83;
  • Peltomaki, Mia - Improving mathematics and programming education - the IMPEd initiative, in Volume 88; - Why Complicate Things? Introducing Programming in High School Using Python, in Volume 52;
  • Pendragon, Tane - Path-Planning by Tessellation of Obstacles, in Volume 16;
  • Penev, Alex - Shallow NLP techniques for Internet Search, in Volume 48;
  • Peng, Kun - A Range Test Secure in the Active Adversary Model, in Volume 68; - Five Sealed-bid Auction Models, in Volume 21;
  • Peng, Shietung - Metacube - A New Interconnection Network for Large Scale Parallel Systems, in Volume 6;
  • Peramunetilleke, Desh - Currency Exchange Rate Forecasting From News Headlines, in Volume 5;
  • Peres, Yardena - A Grammer View for Editing Structured Documents, in Volume 11;
  • Perona, Inigo - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87; - Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
  • Perry, Peter - Fast Segmentation of Large Images, in Volume 16;
  • Persson, Mia - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41; - On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
  • Pervaiz, Ijaz - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
  • Pessoa, Marcos Clayton Fernandes - Internet Projects - International Cooperation, in Volume 23;
  • Petre, Marian - Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52; - Measuring Improvement in Latent Semantic Analysis-Based Marking Systems: Using a Computer to Mark Questions about HTML, in Volume 66;
  • Petrucci, Laure - Towards Formal Specification and Analysis of Avionics Mission Systems, in Volume 12;
  • Pettersen, Oystein - Grid services for e-archaeology, in Volume 82;
  • Pfitzner, Darius - A Unified Taxonomic Framework for Information Visualization, in Volume 24; - Determining Pattern Element Contribution in Medical Datasets, in Volume 68;
  • Pham, Binh - A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights, in Volume 38; - Extensible Detection and Indexing of Highlight Events in Broadcasted Sports Video, in Volume 48; - Key Challenges in Software Internationalisation, in Volume 32; - Performance Factors Analysis of a Wavelet-based Watermarking Method, in Volume 44; - Recovery of Watermark Using Differential Affine Motion Estimation, in Volume 44;
  • Pham, Ha Hai - Intelligent Agents for Automated One-to-Many e-Commerce Negotiation, in Volume 4;
  • Pham, Hai Nam - An Approach to Vickrey-based Resource Allocation in the Presence of Monopolistic Sellers, in Volume 99;
  • Pham, Quan - Commitment Issues in Delegation Process, in Volume 81;
  • Pham, Tuan D. - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73; - Quantification of Neural Images using Grey Difference, in Volume 73;
  • Phelps, Ted - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
  • Philippi, Stephan - Life-Cycle Inheritance in Concurrent Object-Oriented Systems, in Volume 12;
  • Phillipps, Margot - A Perspective on the International Olympiad in Informatics for CS educators, in Volume 95;
  • Phillips, C. - What Makes a Good User Interface Pattern Language?, in Volume 28;
  • Phillips, Chris - In Support of User Interface Design in the Rational Unified Process, in Volume 7;
  • Phillips, James - Human Visual Perception of Region Warping Distortions, in Volume 48;
  • Phillips, Malcolm - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
  • Phillips, Matthew - An Architecture for Multi-View Information Overlays, in Volume 35; - Information Visualisation using Composable Layouts and Visual Sets, in Volume 9; - Interaction Modes for Augmented Reality Visualization, in Volume 9; - Keg Master : a Graph-Aware Visual Editor for 3D Graphs, in Volume 18; - Rapid Assembly and Deployment of Domain Visualisation Solutions, in Volume 9; - View Coordination Architecture for Information Visualisation, in Volume 9;
  • Phua, Clifton - Adaptive Spike Detection for Resilient Data Stream Mining, in Volume 70;
  • Phung, Dinh - Indoor Location Prediction Using Multiple Wireless Received Signal Strengths, in Volume 87;
  • Phung, Dinh Quoc - Preference Networks: Probabilistic Models for Recommendation Systems, in Volume 70;
  • Phung, Nhan - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
  • Piccardi, Massimo - Face and Body Gesture Recognition for a Vision-Based Multimodal Analyzer, in Volume 36; - Observer Annotation of Affective Display and Evaluation of Expressivity: Face vs. Face-and-Body, in Volume 56;
  • Pickering, Mark - Unsupervised band removal leading to improved classification accuracy of hyperspectral images, in Volume 48;
  • Piekarski, Wayne - Comparison of techniques for mixed-space collaborative navigation, in Volume 93; - Evaluation of User Satisfaction and Learnability for Outdoor Augmented Reality Gaming, in Volume 50; - Hand Tracking For Low Powered Mobile AR User Interfaces, in Volume 40; - Lightweight User Interfaces for Watch Based Displays, in Volume 40; - Outdoor Augmented Reality Gaming on Five Dollars a Day, in Volume 40; - Public and Private Workspaces on Tabletop Displays, in Volume 76; - The Tinmith System - Demonstrating New Techniques for Mobile Augmented Reality Modelling, in Volume 7; - User Evaluation of God-like Interaction Techniques, in Volume 76;
  • Pieprzyk, Josef - Formal Analysis of Card-based Payment Systems in Mobile devices, in Volume 54; - Formal Security Analysis of Australian E-passport Implementation, in Volume 81;
  • Pilgrim, C. J. - Trends in Sitemap Designs - A Taxonomy and Survey, in Volume 64;
  • Pineda-Villavicencio, Guillermo - On the Non-existence of Even Degree Graphs with Diameter 2 and Defect 2, in Volume 77;
  • Pirzada, Asad - Asad Pirzada, Ryan Wishart, Marius Portmann and Jadwiga Indulska, in Volume 91; - HOVER: Hybrid On-demand Distance Vector Routing for Wireless Mesh Networks, in Volume 74; - Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol, in Volume 62;
  • Pirzada, Asad Amir - Dependable Dynamic Source Routing without a Trusted Third Party, in Volume 38; - Establishing Trust In Pure Ad-hoc Networks, in Volume 26; - Kerberos Assisted Authentication in Mobile Ad-hoc Networks, in Volume 26;
  • Pisan, Yusuf - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50; - Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20;
  • Pitt, Ellen - The Use of Various Data Mining and Feature Selection Methods in the Analysis of a Population Survey Dataset, in Volume 84;
  • Plank, Ashley - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61; - An efficient hash-based algorithm for minimal k-anonymity, in Volume 74; - Privacy-aware Access Control with Generalization Boundaries, in Volume 91;
  • Plimmer, Beryl - A Pen-based Paperless Environment for Annotating and Marking Student Assignments, in Volume 50; - Beautifying Sketching-based Design Tool Content: Issues and Experiences, in Volume 40; - Computer-Aided Sketching to Capture Preliminary Design, in Volume 7; - Connector Semantics for Sketched Diagram Recognition, in Volume 64; - Sketching ER Diagrams, in Volume 93;
  • Pokorny, Jaroslav - UserMap : an Adaptive Enhancing of User-Driven XML-to-Relational Mapping Strategies, in Volume 75;
  • Pollard, Janelle - A Reference Architecture for Instructional Educational Software, in Volume 46;
  • Pollett, Chris - Circuit Principles and Weak Pigeonhole Variants, in Volume 41;
  • Poon, Chung Keung - On-demand Bounded Broadcast Scheduling with Tight Deadlines, in Volume 51;
  • Poon, Josiah - A New Evaluation Measure for Imbalanced Datasets, in Volume 87;
  • Pope, Bernard - A Program Transformation for Debugging Haskell 98, in Volume 16;
  • Pope, Simon - Semantic Constraints for Trust Transitivity, in Volume 43; - Trust Network Analysis with Subjective Logic, in Volume 48; - Trust Requirements in Identity Management, in Volume 44;
  • Porter, Ron - A Pattern-Based Problem-Solving Process for Novice Programmers, in Volume 20; - Applying Patterns to Novice Programming Problems, in Volume 13;
  • Porter, Ronald - Patterns in Learning to Program - An Experiment?, in Volume 30;
  • Porter, Shane R. - Augmenting Image Place AR 3D Interactions for Wearable Computers, in Volume 93;
  • Portmann, Marius - Asad Pirzada, Ryan Wishart, Marius Portmann and Jadwiga Indulska, in Volume 91; - HOVER: Hybrid On-demand Distance Vector Routing for Wireless Mesh Networks, in Volume 74; - Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol, in Volume 62;
  • Pose, Ronald - Human Visual Perception of Region Warping Distortions, in Volume 48; - Large Object Segmentation with Region Priority Rendering, in Volume 38;
  • Potamianos, Gerasimos - Audio-Visual Speech Processing: Progress and Challenges, in Volume 56; - Audio-Visual Technologies for Lecture and Meeting Analysis inside Smart Rooms, in Volume 56;
  • Potanin, Alex - Annotating UI Architecture with Actual Use, in Volume 76;
  • Potgieter, B. Christo - Change and Innovation We Expect of ICT Teaching Staff, in Volume 30;
  • Pothipruk, Pakornpong - An Optimization for Query Answering on ALC Database, in Volume 49;
  • Potika, Katerina - Polygons Labelling of Minimum Leader Length, in Volume 60;
  • Potter, John - Flexible Exclusion Control for Composite Objects, in Volume 38; - Learning Causal Networks from Microarray Data, in Volume 73;
  • Powell, Antony - Measuring Safety: Applying PSM to the System Safety Domain, in Volume 33;
  • Powell, Daniel - Automatic Derivation of Loop Termination Conditions to Support Verification, in Volume 26;
  • Power, James F. - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
  • Powers, David M.W. - A Unified Taxonomic Framework for Information Visualization, in Volume 24; - Audio-Visual Speech Recognition Using Red Exclusion and Neural Networks, in Volume 4; - Automatic Thesaurus Construction, in Volume 74; - CURIO: A Fast Outlier and Outlier Cluster Detection Algorithm for Large Datasets, in Volume 84; - Lip Feature Extraction Using Red Exclusion, in Volume 2; - Measuring Semantic Similarity in the Taxonomy of WordNet, in Volume 38; - Minors as Miners - Modelling and Evaluating Ontological and Linguistic Learning, in Volume 87; - Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition, in Volume 26; - Vision in HCI: Embodiment, Multimodality and Information Capacity, in Volume 56;
  • Powers, Kris D. - Teaching Computer Architecture in Introductory Computing: Why? and How?, in Volume 30;
  • Prahofer, Herbert - A Component-Based Application Framework for Manufacturing Execution Systems in C# and .NET, in Volume 10;
  • Prakash, Edmond C. - A System for Geographical and Spatial Data Exploration on the Internet, in Volume 2;
  • Pramudiono, Iko - WEB Community Mining and WEB Log Mining: Commodity Cluster Based Execution, in Volume 5;
  • Prasad, Christine - Decoding Doodles: Novice Programmers and Their Annotations, in Volume 66; - Teaching Introductory Programming to Information Systems and Computing Majors: Is There a Difference?, in Volume 30;
  • Prasard, Christine - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
  • Prasher, Sham - Multiresolution Amalgamation: Dynamic Spatial Data Cube Generation, in Volume 27;
  • Pree, Wolfgang - MUSA-Shadow: Concepts, Implementation and Sample Applications - A Location-Based Service Supporting Multiple Devices, in Volume 10;
  • Prekop, Paul - Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom, in Volume 21;
  • Price, Keith - Why Computers Will Never Be People, in Volume 37;
  • Price, Richard - Concepts for Multimedia Database Exploitation, in Volume 39; - Volume, Velocity and Variety - Key Challenges for Mining Large Volumes of Multimedia Information, in Volume 87;
  • Price, Sara - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
  • Prieto, Elena - The Method of Extremal Structure on the k-Maximum Cut Problem, in Volume 41;
  • Prinz, Andreas - Operational Semantics of Transactions, in Volume 17;
  • Prior, Julia Coleman - Online Assessment of SQL Query Formulation Skills, in Volume 20;
  • Proctor, Romina M. J. - Integrating Concrete and Virtual Materials in an Elementary Mathematics Classroom: A Case Study of Success with Fractions, in Volume 8;
  • Proper, H. A. - Transformation selection for aptness-based web retrieval, in Volume 39;
  • Proper, H.A. - On Utility-based Selection of Architecture-Modelling Concepts, in Volume 43;
  • Prost, Jean-Philippe - CORAL : Using Natural Language Generation for Navigational Assistance, in Volume 16;
  • Puchinger, Jakob - The Core Concept for 0/1 Integer Programming, in Volume 77;
  • Puglisi, Simon J. - Suffix Arrays: What Are They Good For?, in Volume 49;
  • Pulo, K. J. - Recursive Space Decompositions in Force-Directed Graph Drawing Algorithms, in Volume 9;
  • Pulo, Kevin - Direct Interaction with Large-Scale Display Systems using Infrared Laser tracking Devices, in Volume 24; - Inclusion Tree Layout Convention : An Empirical Investigation, in Volume 24;
  • Pumfrey, David - The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation, in Volume 47;
  • Puonti, Sami - Nalkki-project - tool for plagiarism detection using the web, in Volume 88;
  • Puper, J. - ICT and the New Roles of the Teacher in Dutch Secondary Education, in Volume 23;
  • Pupunwiwat, Prapassara - Unified Q-ary Tree for RFID Tag Anti-Collision Resolution, in Volume 92;
  • Purchase, Helen - The 'Mental Map' versus 'Static Aesthetic' Compromise in Dynamic Graphs : A User Study, in Volume 76;
  • Purchase, Helen C. - Graph Drawing Aesthetics and the Comprehension of UML Class Diagrams: An Empirical Study, in Volume 9; - UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
  • Purvis, Martin - A Market-based Rule Learning System, in Volume 32; - Educational Experiences From a Global Software Engineering (GSE) Project, in Volume 30; - Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory, in Volume 26; - Information Systems as Distributed Multi-agent Systems, in Volume 43; - Visualisation and Comparison of Image Collections based on Self-organised Maps, in Volume 32;
  • Purvis, Maryam - Educational Experiences From a Global Software Engineering (GSE) Project, in Volume 30; - Monitoring and Controlling of a Multi-agent Based Workflow System, in Volume 32; - Towards a multi-lingual workflow system - a practical outlook, in Volume 32;
Top of List

Q

  • Qadir, M. Abdul - Intelligent Cache Management for Data Grid, in Volume 44;
  • Qiu, Ling - Safely Delegating Data Mining Tasks, in Volume 61;
  • Qu, Kunbin - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
  • Qu, Wei - Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf, in Volume 16;
  • Quan, Tho T. - Ontology Evolution for Customer Services, in Volume 90;
  • Quek, Francis - Mental Imagery, Language and Gesture: Multimodal Access to Human Communication, in Volume 57;
  • Quigley, Aaron J. - 'Powerpoint to the People' : Suiting the Word to the Audience, in Volume 28; - Large Scale 3D Clustering and Abstraction, in Volume 2;
  • Quincy - Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks, in Volume 75;
  • Quinn, Aaron - Accepting Manipulation or Manipulating What's Acceptable?, in Volume 37;
  • Quinn, Anthony - A Classification Algorithm that Derives Weighted Sum Scores for Insight into Disease, in Volume 97; - Classification for accuracy and insight: A weighted sum approach, in Volume 70;
  • Quinn, Philip - The Effects of Menu Parallelism on Visual Search and Selection, in Volume 76;
  • Quirchmayr, Gerald - A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services, in Volume 68; - Adaptive Learning Environments for CS Education : From AMLE to Live Spaces, in Volume 20; - Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing, in Volume 21; - Survivability and Business Continuity Management, in Volume 32; - The motivation and proposition of a privacy-enhancing architecture for operational databases, in Volume 68;
  • Qureshi, Zahid H. - A Review of Accident Modelling Approaches for Complex Socio-Technical Systems, in Volume 86; - Formal Modelling and Analysis of Mission-Critical Software in Military Avionics Systems, in Volume 69; - Towards Formal Specification and Analysis of Avionics Mission Systems, in Volume 12;
Top of List

R

  • Raak, Thomas - Database Collaboration Instead of Integration, in Volume 43;
  • Raban, Richard - The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
  • Rabhi, F. - Patterns for e-service composition, in Volume 13;
  • Rabhi, Fethi A. - Bridging Semantic Gap, in Volume 13;
  • Raddum, Havard - Algebraic Analysis of LEX, in Volume 98;
  • Rademaker, Alexandre - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
  • Radi, Odette - The Impact of Computer Use on Literacy in Reading Comprehension and Vocabulary Skills, in Volume 8;
  • Radomirovic, Sasa - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
  • Rae, Andrew - Guidance for Def (Aust) 5679 Issue 2, in Volume 100; - Helping the Operator in the Loop: Practical Human Machine Interface Principles for Safe Computer Controlled Systems, in Volume 86;
  • Raffensperger, John F. - Displaying Linear Programs and Their Solutions With XML and SVG, in Volume 35;
  • Raghavan, Vijay V. - A Methodology for Hiding Knowledge in Databases, in Volume 14;
  • Rahayu, J. Wenny - Aggregation Query Model for OODBMS, in Volume 10; - ODMG Extension of Composite Objects in OODBMS: A Proposal, in Volume 10;
  • Rahwan, Iyad - Intelligent Agents for Automated One-to-Many e-Commerce Negotiation, in Volume 4;
  • Raikundalia, Gitesh - Newly-discovered Group Awareness Mechanisms for Supporting Real-time Collaborative Authoring, in Volume 40;
  • Raikundalia, Gitesh K. - Extended Radar View and Modification Director: Awareness Mechanisms for Synchronous Collaborative Authoring, in Volume 50; - Hospital Management Knowledge Discovery using Discrete Event Simulation, in Volume 68; - Middle-Aged Users' Experience of Short Message Service, in Volume 50; - SWIM: An Alternative Interface for MSN Messenger, in Volume 64;
  • Rajala, Teemu - VILLE - a language-independent program visualization tool, in Volume 88;
  • Rakotomalala, Ricco - Accuracy Estimation With Clustered Dataset, in Volume 61;
  • Rakotonirainy, Andry - A Survey of Research on Context-Aware Homes, in Volume 21;
  • Ramakrishna, M.V. - A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases, in Volume 5;
  • Ramakrishnan, Raghu - Web Data Management, in Volume 75;
  • Ramamohanarao, Kotagiri - A Bayesian Approach to Use Emerging Patterns for Classification, in Volume 17;
  • Ramamritham, Krithi - Taming the Dynamics of Distributed Data, in Volume 63;
  • Ramsay, Neil - Annotating UI Architecture with Actual Use, in Volume 76;
  • Rana, Omer F. - Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids, in Volume 4;
  • Randell, Cliff - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
  • Randhawa, Sharmil - Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images, in Volume 26;
  • Randolph, Nick - A Generalised Spreadsheet Verification Methodology, in Volume 4;
  • Ranjan, Desh - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
  • Rankine, T. - Service Oriented Grid Architecture for Geosciences Community, in Volume 68;
  • Rao, M.R.K. Krishna - Learnability of Term Rewrite Systems from Positive Examples, in Volume 51;
  • Ratcliffe, David - Towards Scalable Ontology Engineering Patterns: Lessons Learned from an Experiment based on W3Cs Part-whole Guidelines, in Volume 72;
  • Rauch, Felix - OS Support for a Commodity Database on PC clusters - Distributed Devices vs. Distributed File Systems, in Volume 39;
  • Ravada, Siva - Oracle's Technology for Bioinformatics and Future Directions, in Volume 19;
  • Ravana, Sri Devi - Score Aggregation Techniques in Retrieval Experimentation, in Volume 92;
  • Ravikumar, B. - Approximate Recognition of Non-regular Languages by Finite Automata, in Volume 38;
  • Ray, Pradeep K. - Bridging Semantic Gap, in Volume 13;
  • Raymond, Emma - Visualising the Probability Distribution Function of Uncertain Data - Application to Stochastic Modelling of Ground Water Solute Transport, in Volume 9;
  • Reading, Jill - Teaching for Tomorrow - Integrating Learning Technologies into Early Years Professional Development , in Volume 34;
  • Reddacliff, Cathy - Young Children Talking about Their Use of the Internet at Home and at School , in Volume 34;
  • Redding, Nicholas J. - Fast Segmentation of Large Images, in Volume 16;
  • Redmill, Felix - A Community Club on Safety-Critical Systems, in Volume 15; - Thoughts on Safety Responsibilities of Management, in Volume 86;
  • Rees, Michael J. - Evolving the Browser Towards a Standard User Interface Architecture, in Volume 7;
  • Reeve, Greg - Logic and Refinement for Charts, in Volume 48;
  • Reeves, Steve - Logic and Refinement for Charts, in Volume 48;
  • Regan, Lyn - Integration of ICT into the Curriculum at Anderson's Creek Primary School, in Volume 23;
  • Regan, Matthew - Human Visual Perception of Region Warping Distortions, in Volume 48; - Large Object Segmentation with Region Priority Rendering, in Volume 38;
  • Reid, Jason - Commitment Issues in Delegation Process, in Volume 81;
  • Reid, Jason F. - DRM, Trusted Computing and Operating System Architecture, in Volume 44;
  • Reid, Wayne - Reasoning about Data Parallelism in Modern Object-Oriented Languages, in Volume 74;
  • Reilly, Rachel E. - An Empirical Evaluation of Chernoff Faces, Star Glyphs, and Spatial Visualisations for Binary Data, in Volume 24;
  • Reina, G. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
  • Reinhardt, Derek - Certification Criteria for Emulation Technology in the Australian Defence Force Military Avionics Context, in Volume 69;
  • Reinhardt, Derek W. - Considerations in the Preference for and Application of RTCA/DO-178B in the Australian Military Avionics Context, in Volume 100;
  • Reinhardt, L. - Some Structural and Geometric Properties of Two-Connected Steiner Networks, in Volume 65;
  • Reitmayr, Gerhard - Location based Applications for Mobile Augmented Reality, in Volume 18;
  • Ren, Qiong - Mitigating Phishing with ID-based Online/Offline Authentication, in Volume 81;
  • Rennie, Lara - Aiding Text Entry of Foreign Alphabets with Visual Keyboard Plus, in Volume 40;
  • Reuter, Jurgen - A Pluggable Architectural Model and a Formally Specified Programming Language Independent API for an Ontological Knowledge Base Server, in Volume 58;
  • Reynolds, Mark - Measuring Data-Driven Ontology Changes using Text Mining, in Volume 70;
  • Reynolds, Nicholas - Musical Composition and Creativity in an ICT-Enriched Learning Environment - a case study, in Volume 23;
  • Reza Z'aba, Muhammad - Algebraic Analysis of LEX, in Volume 98;
  • Rho, YongWoo - Integrated Visualization for Geometry PIG Data, in Volume 60;
  • Rhodes, Anthony - Managing Large Class Assessment, in Volume 30;
  • Rhodes, Anthony W. - Using Self-Defending Objects to Develop Security Aware Applications in Java, in Volume 26;
  • Riaz-ud-Din, Faizal - Solving the Golden Transaction Problem for ARIES-based Multi-level Recovery, in Volume 92; - Using Reflection for Querying XML Documents, in Volume 49;
  • Riaz, Tariq - Multiple Sequence Alignment Using Tabu Search, in Volume 29;
  • Riazati, Dariush - Drill Across and Visualization of Cubes with Non-conformed Dimensions, in Volume 75;
  • Rice, Sally - Defining and Implementing Domains with Multiple Types using Mesodata Modelling Techniques, in Volume 53;
  • Richards, Debbie - Graphically Defining Articulable Tacit Knowledge, in Volume 2; - Intelligent Visualisation of Social Network Analysis Data, in Volume 2; - Layered Earth Inversion Visual Toolkit: A Scientific Visualisation Case Study, in Volume 11; - Selected Tacit Knowledge Observations Within Two Organisations, in Volume 22; - Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20; - The graphical interpretation of plausible tacit knowledge flows, in Volume 24; - Visual Mapping of Articulable Tacit Knowledge, in Volume 9;
  • Richardson, Colin - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
  • Richardson, John - Internationalisation in the Large at Oracle, in Volume 32;
  • Rigole, Peter - A Tool for Component Based Design of Embedded Software, in Volume 10;
  • Riis, Karsten - A Powerful and SQL-Compatible Data Model and Query Language for OLAP, in Volume 5;
  • Ritter, Nicola - Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides, in Volume 62;
  • Ritter, Norbert - Providing Semantically Equivalent, Complete Views for Multilingual Access to Integrated Data, in Volume 83;
  • Rizzo, Alberto - Activity Centred Professional Development and Teachers' Take-Up of ICT, in Volume 23;
  • Roantree, Mark - Metadata Management in Federated Multimedia Systems, in Volume 5;
  • Robards, Matthew - A Discriminant Analysis for Undersampled Data, in Volume 84;
  • Robbins, Anthony - Predictors of success in a first programming course, in Volume 52; - The ability to articulate strategy as a predictor of programming skill, in Volume 52;
  • Robbins, Phil - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52; - Bloom's Taxonomy for CS assessment, in Volume 78;
  • Roberts, Graham H.B. - An Online Programming Assessment Tool, in Volume 20;
  • Roberts, Susan - A Jump-start in Learning? Young Children's Use of CDRom Technology, in Volume 34;
  • Roberts, Tim - This Course Has A Bloom Rating Of 3.9, in Volume 30;
  • Roberts, Tim S. - The Use of Multiple Choice Tests for Formative and Summative Assessment, in Volume 52;
  • Robertson, Calum - News Aware Volatility Forecasting: Is the Content of News Important?, in Volume 70; - What Types of Events Provide the Strongest Evidence that the Stock Market is Affected by Company Specific News?, in Volume 61;
  • Robertson, Elaine - Integration of ICT into the Curriculum at Anderson's Creek Primary School, in Volume 23;
  • Robey, Michael - Java Implementation Verification Using Reverse Engineering, in Volume 26; - Using PSP to Evaluate Student Effort in Achieving Learning - Outcomes in a Software Engineering Assignment, in Volume 42;
  • Robey, Mike - The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
  • Robins, Anthony - My Program is Correct But it Doesn't Run: A Preliminary Investigation of Novice Programmers' Problems, in Volume 42; - Observations of Student Competency in a CS1 Course, in Volume 42; - Problem Distributions in a CS1 Course, in Volume 52;
  • Robinson, Neil J. - Modelling Large Railway Interlockings and Model Checking Small Ones, in Volume 16;
  • Robinson, P. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
  • Robinson, Peter - Agent-Based Distributed Software Verification, in Volume 38;
  • Robinson, Richard M. - SIL Rating Fire Protection Equipment, in Volume 33;
  • Robinson, Ricky - SuperstringRep: Reputation-enhanced Service Discovery, in Volume 38;
  • Robles-Kelly, Antonio - Image Feature Evaluation for Contents-based Image Retrieval, in Volume 56;
  • Roddick, John F. - A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values, in Volume 16; - Application Rates to Undergraduate Programs in Information Technology in Australian Universities, in Volume 4; - Context-Sensitive Mobile Database Summarisation, in Volume 16; - CURIO: A Fast Outlier and Outlier Cluster Detection Algorithm for Large Datasets, in Volume 84; - Defining and Implementing Domains with Multiple Types using Mesodata Modelling Techniques, in Volume 53; - Detecting Anomalous Longitudinal Associations Through Higher Order Mining, in Volume 84; - Detecting Privacy and Ethical Sensitivity in Data Mining Results, in Volume 26; - Discovering Itemset Interactions, in Volume 91; - Establishing a Lineage for Medical Knowledge Discovery, in Volume 70; - Experiences in Building a Tool for Navigating Association Rule Result Sets, in Volume 32; - Exploratory Mining over Organisational Communications Data, in Volume 87; - Marking Time in Sequence Mining, in Volume 61; - On the Impact of Knowledge Discovery and Data Mining, in Volume 1; - SemGrAM - Integrating Semantic Graphs into Association Rule Mining, in Volume 70; - Towards Active Conceptual Modelling for Sudden Events, in Volume 83;
  • Rodrigo, Allen - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29; - Evolution of Relative Synonymous Codon Usage in Human Immunodeficiency Virus Type 1, in Volume 29;
  • Roe, Paul - A Programming Language for Web Service Development, in Volume 38; - A Web Based Environment for Learning to Program, in Volume 16; - Automated Feedback for 'Fill in the Gap' Programming Exercises, in Volume 42; - Collaborative learning - towards a solution for novice programmers, in Volume 78; - Improving the Flexibility of Active Grids through Web Services, in Volume 54; - Program Annotations: Feedback for Students Learning to Program, in Volume 52; - Static Analysis of Students' Java Programs, in Volume 30; - The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66; - Towards a Fully-reflective Meta-programming Language, in Volume 38;
  • Roehm, Uwe - Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks, in Volume 75;
  • Rogers, Bill - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
  • Rogers, Douglas W. - Multiple Platform Videoconferencing to Support Teacher Education and Professional Development in Mathematics, in Volume 23;
  • Rogers, Yvonne - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
  • Rolletschek, Hardy - Representing Experimental Biological Data in Metabolic Networks, in Volume 29;
  • Romeike, Ralf - Applying creativity in CS high school education - criteria, teaching example and evaluation, in Volume 88;
  • Rong-chun, Zhao - Face Recognition Using Multi-feature and Radial Basis Function Network, in Volume 22;
  • Rongchun, Zhao - Optimal Selection of Image Segmentation Algorithms Based on Performance Prediction, in Volume 36;
  • Rosamond, Frances - Parameterized Complexity of the Clique Partition Problem, in Volume 77;
  • Rose, D. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
  • Rosvik, Sindre - National Plans - Local Challenges: Preparing for Life Long Learning in a Digital Society , in Volume 34;
  • Rotolo, Antonino - A Model of Dynamic Resource Allocation in Workflow Systems, in Volume 27; - Process Modelling: The Deontic Way, in Volume 53;
  • Rountree, Janet - Issues Regarding Threshold Concepts in Computer Science, in Volume 95; - Observations of Student Competency in a CS1 Course, in Volume 42;
  • Rountree, Nathan - Issues Regarding Threshold Concepts in Computer Science, in Volume 95; - Observations of Student Competency in a CS1 Course, in Volume 42;
  • Routledge, Nick - UML and XML Schema, in Volume 5;
  • Rowe, Jillian - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42;
  • Royle, Gordon - Edge-Selection Heuristics for Computing Tutte Polynomials, in Volume 94;
  • Rozman, Ivan - Early Assessment of Classification Performance, in Volume 32;
  • Ruan, Shanq-Jang - Sentry Tag: An Efficient Filter Scheme for Low Power Cache, in Volume 6;
  • Rubin, Eran - A Framework Supporting the Utilization of Domain Knowledge Embedded in Software, in Volume 83;
  • Rui, Kexing - Refactoring Use Case Models : The Metamodel, in Volume 16;
  • Ruiz, Natalie - Exploratory Study of Lexical Patterns in Multimodal Cues, in Volume 57;
  • Ruskey, Frank - Generating Balanced Parentheses and Binary Trees by Prefix Shifts, in Volume 77;
  • Russel, A.B.M. - Towards Dynamic Data Grid Framework for eResearch, in Volume 54;
  • Russell, Nick - On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling, in Volume 53;
  • Russell, S. - Security as a Safety Issue in Rail Communications, in Volume 33;
  • Russell, Selwyn - Visually Sealed and Digitally Signed Documents, in Volume 26;
  • Rusu, Adrian - An Experimental Study on Algorithms for Drawing Binary Trees, in Volume 60;
  • Rutherford, Paul - An Interactive Visualisation for Investigating DNA Sequence Information, in Volume 35; - An Interactive Visualisation for Selecting PCR Primers, in Volume 45;
  • Ryan, Amanda - Towards Semantic Interoperability in Healthcare: Ontology Mapping from SNOMED-CT to HL7 version 3, in Volume 72;
  • Ryan, Caspar - Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures, in Volume 62; - Improving the Transparency of Proxy Injection in Java, in Volume 91; - The Effect of Context and Application Type on Mobile Usability: An Empirical Study, in Volume 38;
  • Ryan, Mike - Unsupervised band removal leading to improved classification accuracy of hyperspectral images, in Volume 48;
  • Ryu, Seung Hwan - A Framework for Managing the Evolution of Business Protocols in Web Services, in Volume 67;
Top of List

S

  • Saabas, Ando - Compositional Type Systems for Stack-Based Low-Level Languages, in Volume 51;
  • Sadiq, Shazia - A Model of Dynamic Resource Allocation in Workflow Systems, in Volume 27; - Data Flow and Validation in Workflow Modelling, in Volume 27; - On Building Workflow Models for Flexible Processes, in Volume 5; - Process Modelling: The Deontic Way, in Volume 53; - Using a Temporal Constraint Network for Business Process Execution, in Volume 49;
  • Sadiq, Wasim - Data Flow and Validation in Workflow Modelling, in Volume 27;
  • Sadornil, D. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
  • Saeed, Nauman - Incorporating blogs, social bookmarks, and podcasts into unit teaching, in Volume 78;
  • Saeki, Motoshi - Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling, in Volume 96; - Using Attributed Goal Graphs for Software Component Selection: An Application of Goal-Oriented Analysis to Decision Making, in Volume 83;
  • Safavi-Naini, Rei - Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks, in Volume 68;
  • Safavi-Naini, Reihaneh - Digital Rights Management for Content Distribution, in Volume 21;
  • Saffrey, Peter - The 'Mental Map' versus 'Static Aesthetic' Compromise in Dynamic Graphs : A User Study, in Volume 76;
  • Saguez, Christian - Evaluation of Unique Sequences on the European Data Grid, in Volume 19;
  • Sahama, Tony - Developing and Delivering a Software Internationalisation Subject, in Volume 32; - Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98; - Privacy and Security in Open and Trusted Health Information Systems, in Volume 97; - Security Enhanced Linux to Enforce Mandatory Access Control in Health Information Systems, in Volume 80;
  • Sahama, Tony R. - A Data Warehouse Architecture for Clinical Data Warehousing, in Volume 68;
  • Said, Dina - A Study of Local and Global Thresholding Techniques in Text Categorization, in Volume 61;
  • Saint-Paul, Regis - A Framework for Managing the Evolution of Business Protocols in Web Services, in Volume 67;
  • Saito, Toshinori - Roles of the Teacher in Media Literacy Education, in Volume 23;
  • Sajeev, A. S. M. - Roller Interface for Mobile Device Applications, in Volume 64;
  • Sajeev, A.S.M - Pattern Puzzle: A Metaphor for Visualizing Software Complexity Measures, in Volume 60;
  • Sakai, Shinobu - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
  • Salakoski, Tapio - Improving mathematics and programming education - the IMPEd initiative, in Volume 88; - VILLE - a language-independent program visualization tool, in Volume 88; - Why Complicate Things? Introducing Programming in High School Using Python, in Volume 52;
  • Salo, Anniina - Effectiveness of integrating program visualizations to a programming course, in Volume 88;
  • Salvador, Jordi - Image-Based Multi-view Scene Analysis using 'Conexels', in Volume 56;
  • Salzer, Gernot - The Tau Model, Formalizing Topic Maps, in Volume 43;
  • Samer, Marko - Tractable Cases of the Extended Global Cardinality Constraint, in Volume 77;
  • Sanders, J. W. - Reasoning about a Distributed Probabilistic System, in Volume 94;
  • Sanderud, Gunnar - Security in Mobile Communications: Challenges and Opportunities, in Volume 21;
  • Sandom, Carl - Success and Failure: Human as Hero - Human as Hazard, in Volume 86;
  • Sandy, Geoffrey A. - The Online Services Bill: Theories and Evidence of Pornographic Harm, in Volume 1;
  • Saneifar, Hassan - S2MP: Similarity Measure for Sequential Patterns, in Volume 87;
  • Sang, Yingpeng - Privacy Preserving Set Intersection Protocol Based on Bilinear Group, in Volume 74;
  • Santiago, Confesor - An Experimental Study on Algorithms for Drawing Binary Trees, in Volume 60;
  • Saragih, Jason - Learning Active Appearance Models from Image Sequences, in Volume 56;
  • Sarai, Akinori - Structure-Function Relationship in DNA Sequence Recognition by Transcription Factors, in Volume 29;
  • Sarje, Anil K. - OCP - A Distributed Real Time Commit Protocol, in Volume 49;
  • Sarkar, Pradip K. - A Set of Patterns for the Web-based Interfaces of an Employee Services System, in Volume 13;
  • Sasaki, M. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
  • Sattar, Abdul - Code Improvements for Model Elimination Based Reasoning Systems, in Volume 26; - Handling of Current Time in Native XML Databases, in Volume 49; - Improving Search in a Hypothetical Reasoning System, in Volume 16;
  • Saunders, Gary - Applying Anatomical Therapeutic Chemical (ATC) and Critical Term Ontologies to Australian Drug Safety Data for Association Rules and Adverse Event Signalling, in Volume 58;
  • Saunders, Shane - Efficient Algorithms for Solving Shortest Paths on Nearly Acyclic Directed Graphs, in Volume 41;
  • Savage, Joshua - Rapid Visual Flow: How Fast Is Too Fast?, in Volume 28;
  • Savarimuthu, Bastin Tony Roy - Monitoring and Controlling of a Multi-agent Based Workflow System, in Volume 32; - Towards a multi-lingual workflow system - a practical outlook, in Volume 32;
  • Savonnet, Marinette - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
  • Sbarski, Peter - Compact Layout of Layered Trees, in Volume 62;
  • Scanlan, Joel - Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists, in Volume 54;
  • Schachte, Peter - Boolean Affine Approximation with Binary Decision Diagrams, in Volume 94; - Boolean equation solving as graph traversal, in Volume 51; - ParaAJ: toward Reusable and Maintainable Aspect Oriented Programs, in Volume 91; - QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks, in Volume 62;
  • Schadow, Gunther - Privacy-Preserving Distributed Queries for a Clinical Case Research Network, in Volume 14;
  • Schaeffer, Jaron - A Pluggable Architectural Model and a Formally Specified Programming Language Independent API for an Ontological Knowledge Base Server, in Volume 58;
  • Schafer, Andreas - Conceptional Modeling and Analysis of Spatio-Temporal Processes in Biomolecular Systems, in Volume 96;
  • Schauder, Don - The Webworkforce - a learning repository to support educators, trainers and Information Technology courses, in Volume 20;
  • Schewe, Klaus-Dieter - A Heuristic Approach to Cost-Efficient Derived Horizontal Fragmentation of Complex Value Databases, in Volume 63; - A Heuristic Approach to Cost-Efficient Fragmentation and Allocation of Complex Value Databases, in Volume 49; - A Typed Higher-Order Calculus for Querying XML Databases, in Volume 75; - Balancing Redundancy and Query Costs in Distributed Data Warehouses, in Volume 43; - Component-Driven Engineering of Database Applications, in Volume 53; - Conceptual Application Domain Modelling, in Volume 96; - Context Analysis: Toward Pragmatics of Web Information Systems Design, in Volume 79; - Context-Aware Web Information Systems, in Volume 31; - Dynamic Data Warehouse Design as a Refinement in ASM-based Approach, in Volume 67; - Redundancy, Dependencies and Normal Forms for XML Databases, in Volume 39; - Solving the Golden Transaction Problem for ARIES-based Multi-level Recovery, in Volume 92; - Using Abstract State Machines for Distributed Data Warehouse Design, in Volume 31; - Using Reflection for Querying XML Documents, in Volume 49;
  • Schibeci, David - Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources, in Volume 44;
  • Schiller, Oliver - flashWeb: Graphical Modeling of Web Applications for Data Management, in Volume 83;
  • Schlieder, Torsten - Approximative Filtering of XML Documents in Publish/Subscribe Systems, in Volume 48;
  • Schmalstieg, Dieter - Interactive Mediated Reality, in Volume 40; - Location based Applications for Mobile Augmented Reality, in Volume 18;
  • Schmandt, Chris - AreWeThereYet? - A Temporally Aware Media Player, in Volume 76;
  • Schmerl, Bradley - Architecture-driven Modelling and Analysis, in Volume 69;
  • Schmid, Michael F. - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
  • Schmidt, Heinz - Compositional Software Architecture Definition, in Volume 12; - Signature Extraction for Overlap Detection in Documents, in Volume 4; - Suffix Vector: Space- and Time-Efficient Alternative to Suffix Trees, in Volume 4;
  • Schmieder, Paul - Sketching ER Diagrams, in Volume 93;
  • Scholer, Falk - A Comparative Study of Probabalistic and Language Models for Information Retrieval, in Volume 75;
  • Scholz, Jason - Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom, in Volume 21;
  • Schommer, Christoph - Description of Bad-Signatures for Network Intrusion Detection, in Volume 54;
  • Schope, Lothar - Development of an Electronic Commerce Portal System using a Specific Software Development Process, in Volume 10;
  • Schrefl, Michael - Exploiting Semantics of Inter-Process Dependencies to Instantiate Predefined Integration Patterns, in Volume 83; - Modelling Inter-Process Dependencies with High-Level Business Process Modelling Languages, in Volume 79; - Multi-Level Domain Modeling with M-Objects and M-Relationships, in Volume 96; - On the Road to Behavior-Based Integration, in Volume 31;
  • Schreiber, Falk - Comparison of Metabolic Pathways using Constraint Graph Drawing, in Volume 19; - Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs, in Volume 60; - Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size, in Volume 26; - Optimal Leaf Ordering for Two and a Half Dimensional Phylogenetic Tree Visualisation, in Volume 35; - Representing Experimental Biological Data in Metabolic Networks, in Volume 29; - Visual Analysis of Network Centralities, in Volume 60;
  • Schreiber, Mark - Signals in mRNAs that Influence the Initiation of Translation, in Volume 19;
  • Schroder-Preikschat, Wolfgang - AspectC++: An Aspect-Oriented Extension to the C++ Programming Language, in Volume 10;
  • Schroder, Heiko - A Dihedral Angle Database of Short Sub-sequences for Protein Structure Prediction, in Volume 29;
  • Schrot, Paul P. - Improving Environmental Decision-making: Bridging the Gap between Conceptual Modelling and Quantitative Analyses with Quasta, in Volume 83;
  • Schulte, Carsten - Computer science in context - pathways to computer science, in Volume 88; - What does 'objects-first' mean? An international study of teachers' perceptions of objects-first, in Volume 88;
  • Schulthess, P. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
  • Schulz, Hans-Jorg - A Framework for Visual Data Mining of Structures, in Volume 48;
  • Schumann, Heidrun - A Framework for Visual Data Mining of Structures, in Volume 48; - Enhancing the Visualization Process with Principal Component Analysis to Support the Exploration of Trends, in Volume 60;
  • Schwartzman, Leslie - Student transformative learning in software engineering and design: discontinuity (pre)serves meaning, in Volume 88;
  • Schwarz, Holger - flashWeb: Graphical Modeling of Web Applications for Data Management, in Volume 83;
  • Schwarz, Kilian - Grid Computing in Europe: From Research to Deployment, in Volume 44;
  • Schwitter, Rolf - Annotating Websites with Machine-processable Information in Controlled Natural Language, in Volume 72; - Creating and Querying Linguistically Motivated Ontologies, in Volume 90; - Natural Language Processing in the Undergraduate Curriculum, in Volume 20;
  • Schwoebbermeyer, Henning - Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs, in Volume 60;
  • Scriven, Ian - Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids, in Volume 82;
  • Searle, Glenn - Funktion Zusammen: Two Schools, One Class and German LOTE in Rural Queensland, in Volume 8;
  • Seberry, Jennifer - A New Very Fast Stream Cipher : Tpy, in Volume 81;
  • Sedukhin, Stanislav G. - Trident: A Scalable Architecture for Scalar, Vector and Matrix Operations, in Volume 6;
  • Segal, Tariq - Let the Shoemaker Make the Shoes - An Abstraction Layer is Needed Between Bioinformatic Analysis, Tools, Data and Equipment : An Agenda for the Next Five Years, in Volume 19;
  • Seki, Tomokazu - Protein Side-chain Packing Problem: A Maximum Edge-weight Clique Algorithmic Approach, in Volume 29;
  • Selvaraj, Samuel - Structure-Function Relationship in DNA Sequence Recognition by Transcription Factors, in Volume 29;
  • Serafini, Luciano - Towards Distributed Tableaux Reasoning Procedure for DDL with Increased Subsumption Propagation between Remote Ontologies, in Volume 90;
  • Serradilla, Francisco - The Effect of Sparsity on Collaborative Filtering Metrics, in Volume 92;
  • Seymon, S. - Dogs or Robots - Why do Children See Them as Robotic Pets Rather Than Canine Machines?, in Volume 28;
  • Shah, Ashish - The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights, in Volume 44;
  • Shah, Nita H. - Optimal Joint Vendor-Buyer Inventory Strategy for Deteriorating Items with Salvage Value, in Volume 77;
  • Shalom, S. A. Arul - Graphics Hardware based Efficient and Scalable Fuzzy C-Means Clustering, in Volume 87;
  • Shan, Yin - Mining Medical Specialist Billing Patterns for Health Service Management, in Volume 87;
  • Shankaranarayanan, Avinash - A Template Based Static Coalition Protocol - A3PviGrid, in Volume 54;
  • Shanker, Udai - OCP - A Distributed Real Time Commit Protocol, in Volume 49;
  • Shanks, Vaughan R. - Indexing for Fast Categorisation, in Volume 16;
  • Shanneb, Abdelsalam - Flexible Exclusion Control for Composite Objects, in Volume 38;
  • Shao, Xi - Image Mosaics Based on Homogenous Coordinates, in Volume 22;
  • Sharkey, Emma - Adventure Cycles A Software Engineering Approach, in Volume 30;
  • Shaw, D.T. - Modelling Layer 2 and Layer 3 Device Bandwidths using B-Node Theory, in Volume 48;
  • Shaw, Katherine - Engendering an Empathy for Software Engineering, in Volume 42;
  • Shea, Roy - TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
  • Sheard, Judithe - Adopting XP Practices for Teaching Object Oriented Programming, in Volume 52;
  • Sheard, Judy - Determination of Factors which Impact on IT Students' Propensity to Cheat, in Volume 20; - From Informal to Formal: Creating the Australasian Computing Education Community, in Volume 30; - ICT teaching and learning in a new educational paradigm: lecturers' perceptions versus students' experiences, in Volume 88; - Multi-Institutional Teaching Communities in Computer Education, in Volume 52; - Performance and progression of first year ICT students, in Volume 78; - WAT - A Tool for Classifying Learning Activities from a Log File, in Volume 66; - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
  • Shehadi, Ihsan A. - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
  • Shekhovtsov, Vladimir A. - An e-Process Selection Model, in Volume 83;
  • Shen, Heng Tao - Efficient Similarity Search by Summarization in Large Video Database, in Volume 63; - Exploring Bit-Difference for Approximate KNN Search in High-dimensional Databases, in Volume 39; - Large-scale Video Sequence Indexing: Impacts, Ideas and Trends, in Volume 92; - Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
  • Shen, Hengtao - Diagonal Ordering: A New Approach to High-Dimensional KNN Processing, in Volume 27;
  • Shen, Hong - Privacy Preserving Set Intersection Protocol Based on Bilinear Group, in Volume 74;
  • Shen, Jialie - Exploring Bit-Difference for Approximate KNN Search in High-dimensional Databases, in Volume 39;
  • Shen, Xiaobin - MoneyTree: Ambient Information Visualization Of Financial Data, in Volume 36; - Using MoneyColor to Represent Financial Data, in Volume 45;
  • Shen, Zeqian - BiblioViz: A System for Visualizing Bibliography Information, in Volume 60;
  • Shepherd, John - A Collaborative Approach for Caching Dynamic Data in Portal Applications, in Volume 27; - Document Classification via Structure Synopses, in Volume 17; - Information Retrieval in Structured Domains, in Volume 92;
  • Sheppard, Nicholas Paul - Digital Rights Management for Content Distribution, in Volume 21;
  • Shi, Mingren - A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73;
  • Shi, Yu - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
  • Shi, Z. - Rule Sets Based Bilevel Decision Model, in Volume 48;
  • Shiba, Ayumi - A Wearable Fatigue Monitoring System - Application of Human-Computer Interaction Evaluation, in Volume 50;
  • Shieh, Jong-Jiann - Exploiting Speculative Value Reuse Using Value Prediction, in Volume 6;
  • Shillabeer, Anna - Determining Pattern Element Contribution in Medical Datasets, in Volume 68; - Discovering Itemset Interactions, in Volume 91; - Establishing a Lineage for Medical Knowledge Discovery, in Volume 70;
  • Shimshock, Erik - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
  • Shin, Dongjun - Optimizing Web Content Delivery Using Web Server Accelerator, in Volume 4;
  • Shin, Hyunjung - wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability, in Volume 87;
  • Shinnishi, Makoto - SnapShoot: Integrating Semantic Analysis and Visualization Techniques for Web-based Note Taking System, in Volume 60;
  • Shinohara, Ayumi - Testing Square-Freeness of Strings Compressed by Balanced Straight Line Program, in Volume 94;
  • Shioya, Isamu - Clustering Stream Data by Regression Analysis, in Volume 32;
  • Shizuki, Buntarou - FindFlow: Visual Interface for Information Search based on Intermediate Results, in Volume 60; - Information Gathering Support Interface by the Overview Presentation of Web Search Results, in Volume 60;
  • Shokouhi, Milad - Distributed Text Retrieval From Overlapping Collections, in Volume 63;
  • Shottner, M. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
  • Shuhidan, Shuhaida - A Taxonomic Study of Novice Programming Summative Assessment, in Volume 95;
  • Shui, William - Querying and Maintaining Ordered XML Data using Relational Databases, in Volume 39;
  • Shui, William M. - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19; - Dynamic Labeling Schemes for Ordered XML Based on Type Information, in Volume 49;
  • Siegel, H. J. - Scheduling Parallel Applications on Utility Grids: Time and Cost Trade-off Management, in Volume 91;
  • Sierra, Carles - From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
  • Sifer, Mark - A Grammer View for Editing Structured Documents, in Volume 11; - Querying Web Site Visitor Trend Data with Coordinated Nested Bar and Pie Charts, in Volume 11;
  • Siltanen, Sanni - Augmented Interiors with Digital Camera Images, in Volume 50; - Implementing a Natural User Interface for Camera Phones Using Visual Tags, in Volume 50;
  • Sim, Nigel G. D. - YourSRB: A cross platform interface for SRB and Digital Libraries, in Volume 68;
  • Simari, Guillermo Ricardo - An Argumentative Approach to Reasoning with Inconsistent Ontologies, in Volume 90;
  • Simcock, Todd - Developing a Location Based Tourist Guide Application, in Volume 21;
  • Simeon, Mondelle - Categorical Proportional Difference: A Feature Selection Method for Text Categorization, in Volume 87;
  • Simmich, Terry - Grid services for e-archaeology, in Volume 82;
  • Simmonds, Andy - Student Learning Experience with an Industry Certification Course at University, in Volume 20;
  • Simoff, Simeon - Customer Analytics Projects: Addressing Existing Problems with a Process that Leads to Success, in Volume 70; - From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
  • Simoff, Simeon J. - Comparison of Visualization Methods of Genome-wide SNP Profiles in Childhood Acute Lymphoblastic Leukaemia, in Volume 87; - Elastic Metaphors: Expanding the Philosophy of Interface Design, in Volume 37; - Enterprise Architecture Modelling using Elastic Metaphors, in Volume 31; - Kernel-based Visualisation of Genes with the Gene Ontology, in Volume 87; - Modelling Enterprise Architectures: An Approach Based on Linking Metaphors and Ontologies, in Volume 58; - Network Data Mining: Methods and Techniques for Discovering Deep Linkage between Attributes, in Volume 53; - Weighted Kernel Model For Text Categorization, in Volume 61;
  • Simon - A Grid Resource Allocation Mechanism for Heterogeneous E-waste Computers, in Volume 99; - An IT degree combining the expertise of University and TAFE, in Volume 20; - Electronic Watermarks to Help Authenticate Soft-copy Exams, in Volume 42; - Koli Calling comes of age: an analysis, in Volume 88; - Mandatory fields - a case study in the divergence between education and practice, in Volume 66; - Mental models, consistency and programming aptitude, in Volume 78; - Predictors of success in a first programming course, in Volume 52; - Surely We Must Learn to Read before We Learn to Write!, in Volume 95; - Ten Years of the Australasian Computing Education Conference, in Volume 95; - The ability to articulate strategy as a predictor of programming skill, in Volume 52; - The Cryptic Crossword Puzzle as a Useful Analogue in Teaching Programming, in Volume 30;
  • Simon, Beth - Quality of Student Contributed Questions Using PeerWise, in Volume 95; - The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78;
  • Simpson, Leonie - Algebraic Analysis of LEX, in Volume 98;
  • Simpson, Matthew - Successful Studio-based Real-World Projects in IT Education, in Volume 20;
  • Singh, Abhishek - Creating an Internet Inter-ORB Protocol Service Specification, in Volume 12;
  • Singh, Pramod K. - Unsupervised Segmentation of Medical Images using DCT Coefficients, in Volume 36;
  • Singh, Samar - Bandwidth Reservation Strategies for Mobility Support of Wireless Connections with QoS Guarantees, in Volume 4;
  • Singh, Vijay Pal - Hand gestures for HCI using ICA of EMG, in Volume 56;
  • Sinha, Ranjan - Efficient Trie-Based Sorting of Large Sets of Strings, in Volume 16; - HAT-Trie: A Cache-Conscious Trie-Based Data Structure For Strings, in Volume 62; - Pruning SIFT for Scalable Near-duplicate Image Matching, in Volume 63;
  • Sirett, William G. - Countermeasures for Attacks on Satellite TV Cards using Open Receivers, in Volume 44;
  • Sirkkala, Petri - Nalkki-project - tool for plagiarism detection using the web, in Volume 88;
  • Sitzmann, Inga - Compacting Discriminator Information for Spatial Trees, in Volume 5;
  • Skabar, Andrew - Neural Networks and Financial Trading and the Efficient Markets Hypothesis, in Volume 4;
  • Skeers, Rebecca - Self and Peer Assessment in Software Engineering Projects, in Volume 42;
  • Skillicorn, D.B. - Programming with Heterogeneous Structures: Manipulating XML data Using bondi, in Volume 48;
  • Skopal, Tomas - Elliptic Indexing of Multidimensional Databases, in Volume 92;
  • Sladek, Jarrah - Speech-to-Text Transcription in Support of Pervasive Computing, in Volume 25;
  • Sladescu, Matthew - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
  • Slaviero, Jackie - Communicate in an E-Learning Community , in Volume 34;
  • Slay, Hannah - Evaluation of a Universal Interaction and Control Device for use within Multiple Heterogeneous Display Ubiquitous Environments, in Volume 50; - Interaction Modes for Augmented Reality Visualization, in Volume 9; - Keg Master : a Graph-Aware Visual Editor for 3D Graphs, in Volume 18; - Tangible User Interaction Using Augmented Reality, in Volume 7;
  • Slay, Jill - Adaptive Learning Environments for CS Education : From AMLE to Live Spaces, in Volume 20;
  • Sloane, Anthony - Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20;
  • Sloane, Anthony M. - A Pattern Enforcing Compiler (PEC) for Java: Using the Compiler, in Volume 43;
  • Smale, Paul - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
  • Smart, Will - Applying Online Gradient-Descent Search to Genetic Programming for Object Recognition, in Volume 32;
  • Smid, Michiel - Geometric spanners with few edges and degree five, in Volume 51;
  • Smillie, Jonathan - Integrating The MACHO Data-set with the Virtual Observatory, in Volume 44;
  • Smith-Miles, Kate - Adaptive Spike Detection for Resilient Data Stream Mining, in Volume 70;
  • Smith, Glenn - On the efficacy of prerecorded lectures for teaching introductory programming, in Volume 78; - Tight Spirals and Industry Clients: The Modern SE Education Experience, in Volume 42; - Using Animations to Support the Teaching of General Computing Concepts, in Volume 30;
  • Smith, Graeme - A Framework for Modelling and Analysing Mobile Systems, in Volume 26; - Specifying Mode Requirements of Embedded Systems, in Volume 4;
  • Smith, Jason - Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks, in Volume 54; - Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework, in Volume 54; - Security as a Safety Issue in Rail Communications, in Volume 33;
  • Smith, Jocelyn - A Collaborative Guidance Case Study, in Volume 76;
  • Smith, Kerrie - EdNA Online for Early Childhood Educators , in Volume 34;
  • Smith, Lesley - Software engineering class eating its own tail, in Volume 66;
  • Smith, Mark T. - Lightweight User Interfaces for Watch Based Displays, in Volume 40;
  • Smith, Matthew - Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids, in Volume 82;
  • Smith, Ross - Hand Tracking For Low Powered Mobile AR User Interfaces, in Volume 40;
  • Smith, Ross T. - Public and Private Workspaces on Tabletop Displays, in Volume 76;
  • Smithies, Russell - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
  • Smyth, Barry - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
  • Smyth, W.F. - An Approach to Phrase Selection for Offline Data Compression, in Volume 4;
  • Smyth, William F. - Suffix Arrays: What Are They Good For?, in Volume 49;
  • Sodre, Victor de�Freitas - Improving Productivity and Quality of GIS Databases Design using an Analysis Pattern Catalog, in Volume 43;
  • Soe, Nay Lin - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
  • Soetanto, Danny - Analyzing Harmonic Monitoring Data Using Data Mining, in Volume 61;
  • Soliman, Mostafa I. - Trident: A Scalable Architecture for Scalar, Vector and Matrix Operations, in Volume 6;
  • Solis-Oba, Roberto - On Packing Squares with Resource Augmentation: Maximizing the Profit, in Volume 41;
  • Solomon, Andrew - Applying NAILS to Blackboard, in Volume 20;
  • Somaraju, Ram - Tamper-proofing Software Watermarks, in Volume 32;
  • Somekh, Bridget - Children Exploring a 'Fun' Web-site: Sites of Learning and Roles of Being, in Volume 34;
  • Sondergaard, Harald - Boolean Affine Approximation with Binary Decision Diagrams, in Volume 94; - Boolean equation solving as graph traversal, in Volume 51; - Making Connections: First Year Transition for Computer Science and Software Engineering Students, in Volume 42; - What Drives Curriculum Change?, in Volume 30;
  • Song, Changxin - A Combined Model and a Varied Gibbs Sampling Algorithm Used for Motif Discovery, in Volume 29;
  • Song, Dawei - Dimensionality Reduction in Patch-Signature Based Protein Structure Matching, in Volume 49; - Document Generality: its Computation for Ranking, in Volume 49;
  • Song, Gao - Reducing Register Pressure Through LAER Algorithm, in Volume 26;
  • Song, Il-Yeol - A Taxonomy of Customer Relationship Management Analyses for Data Warehousing, in Volume 83;
  • Song, Jian - Architecture of a Web Accelerator For Wireless Networks, in Volume 62;
  • Song, Le - Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters, in Volume 45; - Real-time 3D Finger Pointing for an Augmented Desk, in Volume 40;
  • Song, Qun - A Novel Feature Selection Method to Improve Classification of Gene Expression Data, in Volume 29;
  • Sonntag, Benoit - Lisaac: the power of simplicity at work for operating system, in Volume 10;
  • Soon, Lay-Ki - An Empirical Study of Similarity Search in Stock Data, in Volume 84;
  • Sorger, Uli - Slotted Packet Counting Attacks on Anonymity Protocols, in Volume 98;
  • Soriano, Christine - Middle-Aged Users' Experience of Short Message Service, in Volume 50;
  • Sorva, Juha - Students' understandings of storing objects, in Volume 88;
  • Spaccapietra, Stefano - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83; - Exploring New Directions in Conceptual Data Modeling, in Volume 67;
  • Sparks, Ross - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
  • Speer, Jayson - Solving the Golden Transaction Problem for ARIES-based Multi-level Recovery, in Volume 92;
  • Spence, Edward - Cosmopolitanism and the Internet, in Volume 1;
  • Spence, Fiona - Peer Assessment Using Aropa, in Volume 66;
  • Spiewak, Dagmara - Acimn: A protocol for Anonymous Communication In Multi hop wireless networks, in Volume 81;
  • Spinczyk, Olaf - AspectC++: An Aspect-Oriented Extension to the C++ Programming Language, in Volume 10;
  • Squair, Matthew John - Human Engineering for Australia's F/A-18 Night Vision Capability, in Volume 86; - Issues in the Application of Software Safety Standards, in Volume 55; - Safety, Software Architecture and MIL-STD-1760, in Volume 69;
  • Sridharan, Sridha - Audio-Visual Speaker Verification using Continuous Fused HMMs, in Volume 56; - Patch-Based Representation of Visual Speech, in Volume 56;
  • Srinivasan, B. - An Evaluation of Web Services in the Design of a B2B Application, in Volume 26;
  • Srinivasan, Uma - Role of Edge Detection in Video Semantics, in Volume 22;
  • Srivastava, P.K. - A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases, in Volume 5;
  • Staab, Eugen - Slotted Packet Counting Attacks on Anonymity Protocols, in Volume 98;
  • Stafford, Aaron - Comparison of techniques for mixed-space collaborative navigation, in Volume 93; - User Evaluation of God-like Interaction Techniques, in Volume 76;
  • Stager, Gary S. - Computationally-Rich Constructionism and At-Risk Learners, in Volume 8; - Online Constructionism and the Future of Teacher Education, in Volume 23; - The Feeling of Wonderful Ideas - Implications for the Future of Teaching and Learning, in Volume 23;
  • Stanley, Edward - S.E.A.L. - A Query Language for Entity-Association Queries, in Volume 92;
  • Stanley, Timothy D. - Simple Eight Bit, Emulated Computers for Illustrating Computer Architecture Concepts and Providing a Starting Point for Student Designs, in Volume 66;
  • Stantic, Bela - An Efficient Method for Indexing Now-relative Bitemporal data, in Volume 27; - Handling of Current Time in Native XML Databases, in Volume 49; - Unified Q-ary Tree for RFID Tag Anti-Collision Resolution, in Volume 92;
  • Stark, Karen - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42; - Using a Network Simulation Tool to Engage Students in Active Learning Enhances Their Understanding of Complex Data Communications Concepts., in Volume 42;
  • Stead, Stephen - The CIDOC Conceptual Reference Model - A New Standard for Knowledge Sharing, in Volume 83;
  • Steele, Robert - A Local Broker Enabled MobiPass Architecture for Enhancing Trusted Interaction Efficiency, in Volume 74;
  • Stegmaier, S. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
  • Sterling, Leon - A Perspective on the International Olympiad in Informatics for CS educators, in Volume 95;
  • Stern, L. - A Rapid Method of Whole Genome Visualisation Illustrating Features in Both Coding and Non-coding Regions, in Volume 29;
  • Stevenson, Duncan - A Collaborative Guidance Case Study, in Volume 76;
  • Stewart, Arran D. - Building a Disordered Protein Database: A Case Study in Managing Biological Data, in Volume 63;
  • Stewart, Bozena - Reflection on Development and Delivery of a Data Mining Unit, in Volume 70;
  • Stewart, Graeme A. - Storage and Data Management in EGEE, in Volume 68;
  • Stirling, David - Analyzing Harmonic Monitoring Data Using Data Mining, in Volume 61;
  • Stocks, Phil - Self-Replicating Expressions in the Lambda Calculus, in Volume 26;
  • Stoeckle, Hermann - Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
  • Stokes, Jackie - Developing Generic Attributes in a Pre-service Primary Teacher Education Course, in Volume 8; - Towards Knowledge Age Teachers: Reflective Practitioners, in Volume 8;
  • Stone, Gordon - On Arguing the Safety of Large Systems, in Volume 55;
  • Stone, Gordon R. - Complex Reactive Real Time Systems and the Safety Case, in Volume 47;
  • Straeten, Ragnhild Van Der - Specifying and Implementing the Operational Use of Constraints in Object-Oriented Applications, in Volume 10;
  • Stranieri, Andrew - A Classification Algorithm that Derives Weighted Sum Scores for Insight into Disease, in Volume 97; - An Argument Structure Abstraction for Bayesian Belief Networks: Just Outcomes in On-line Dispute Resolution, in Volume 67; - Classification for accuracy and insight: A weighted sum approach, in Volume 70; - Inference of Gene Expression Networks Using Memetic Gene Expression Programming, in Volume 91;
  • Strazdins, Peter - Applying the community of practice approach to individual IT projects, in Volume 78; - Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU, in Volume 62; - Implemention Aspects of a SPARC V9 Complete Machine Simulator, in Volume 4;
  • Stricker, Thomas M. - OS Support for a Commodity Database on PC clusters - Distributed Devices vs. Distributed File Systems, in Volume 39;
  • Strimmer, Korbinian - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29;
  • Strooper, P. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
  • Strooper, Paul - Agent-Based Distributed Software Verification, in Volume 38; - An Approach to Specifying Software Frameworks, in Volume 26; - Evaluation of a New Assesment Scheme for a Third-year Concurrency Course, in Volume 66; - Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models, in Volume 16; - Plug-in Proof Support for Formal Development Environments, in Volume 41; - Translating Refined Logic Programs to Mercury, in Volume 4;
  • Stuckey, Peter - Modelling for Lazy Clause Generation, in Volume 77; - The Core Concept for 0/1 Integer Programming, in Volume 77;
  • Stuckey, Peter J. - Compacting Discriminator Information for Spatial Trees, in Volume 5; - Improving SAT Using 2SAT, in Volume 4;
  • Stucky, Wolffried - A Formal Foundation for Workflow Composition, Workflow View Definition, and Workflow Normalization based on Petri Nets, in Volume 43;
  • Stumptner, Markus - A Native Ontology Approach for Semantic Service Descriptions, in Volume 72; - Enhancing Subjective Ontologies with Social Tagging Systems, in Volume 90; - Exploiting Semantics of Inter-Process Dependencies to Instantiate Predefined Integration Patterns, in Volume 83; - Modelling Inter-Process Dependencies with High-Level Business Process Modelling Languages, in Volume 79; - On the Road to Behavior-Based Integration, in Volume 31; - Trust Based Ontology Integration For The Community Services Sector, in Volume 72;
  • Stuphorn, Jorn - Two Causal Analyses of the Black Hawk Shootdown during Operation Provide Comfort, in Volume 33;
  • Subramaniam, Ganesan - Mesh Simplification using Ellipsoidal Schema for Isotropic Quantization of Face-Normal Vectors, in Volume 60;
  • Sucahyo, Yudho Giri - CT-ITL : Efficient Frequent Item Set Mining Using a Compressed Prefix Tree with Pattern Growth, in Volume 17;
  • Sugiyama, Kozo - Generation of Relevance Maps and Navigation in A Digital Book, in Volume 60; - Method for Drawing Intersecting Clustered Graphs and Its Application to Web Ontology Language, in Volume 60; - Puzzle Generators and Symmetric Puzzle Layout, in Volume 45;
  • Suhonen, Jarkko - Applications of variation theory in computing education, in Volume 88;
  • Sui, Yuefei - An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries, in Volume 83;
  • Sulistio, Anthony - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
  • Sun, Hung-Min - On the Security of Some Proxy Blind Signatures Schemes, in Volume 32;
  • Sun, Jing - Towards Verifying Semistructured Data, in Volume 67;
  • Sun, Lili - Anonymous Access Scheme for Electronic Services, in Volume 26; - Authorization Algorithms for the Mobility of User-Role Relationship, in Volume 38;
  • Sun, Xiaoxun - An efficient hash-based algorithm for minimal k-anonymity, in Volume 74; - Microdata Protection Through Approximate Microaggregation, in Volume 91; - Priority Driven K-Anonymisation for Privacy Protection, in Volume 87;
  • Sun, Xingzhi - Data Reduction Approach for Sensitive Association Classification Rule Hiding, in Volume 75;
  • Sun, Yong - QuickFusion: Multimodal Fusion Without Time Thresholds, in Volume 57;
  • Sun, Zhaohui - Local Prediction Approach of Protein Classification using Probabilistic Suffix Trees, in Volume 29;
  • Sun, Zhirong - A Novel Method for Protein Subcellular Localization Based on Boosting and Probabilistic Neural Network, in Volume 29;
  • Sung, Hosang - Deferred Incremental Refresh of XML Materialized Views : Algorithms and Performance Evaluation, in Volume 17;
  • Surarerks, A. - Formalization of UML Statechart Models Using Concurrent Regular Expressions, in Volume 26;
  • Suriadi, Suriadi - Layered Identity Infrastructure Model for Identity Meta Systems, in Volume 81; - Usability and Privacy in Identity Management Architectures, in Volume 68;
  • Susilo, Willy - Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks, in Volume 68; - Mitigating Phishing with ID-based Online/Offline Authentication, in Volume 81;
  • Sutinen, Alison - Mining Medical Specialist Billing Patterns for Health Service Management, in Volume 87;
  • Sutinen, Erkki - Computer science students can help to solve problems of multiplayer mobile games, in Volume 88; - Con�ictive animations as engaging learning tools, in Volume 88;
  • Sutton, Ken - Surely We Must Learn to Read before We Learn to Write!, in Volume 95; - The ability to articulate strategy as a predictor of programming skill, in Volume 52;
  • Sutton, Peter - Ambient Interaction Framework - Software Infrastructure for the Rapid Development of Pervasive Computing Environments, in Volume 25; - Location Management in Pervasive Systems, in Volume 21;
  • Suzuki, Nobutaka - An XML Document Transformation Algorithm Inferred from an Edit Script between DTDs, in Volume 75;
  • Swaminathan, Sudha - The Role of the Teacher in Scaffolding Children's Interactions in a Technological Environment: How a Technology Project is Transforming Preschool Teacher Practices in Urban Schools, in Volume 34;
  • Symvonis, Antonios - Polygons Labelling of Minimum Leader Length, in Volume 60;
  • Szajman, Jakub - Middle-Aged Users' Experience of Short Message Service, in Volume 50;
  • Szeider, Stefan - The Parameterized Complexity of Regular Subgraph Problems and Generalizations, in Volume 77; - Tractable Cases of the Extended Global Cardinality Constraint, in Volume 77;
  • Szeto, Lap Keung - Gene Expression Data Clustering and Visualization Based on a Binary Heirarchical Clustering Framework, in Volume 19; - Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
Top of List

T

  • Tada, Masahiro - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
  • Tahaghoghi, S. M. M. - Content-based Image Retrieval Using Image Regions as Query Examples, in Volume 75;
  • Tahaghoghi, S.M.M. - Plagiarism Detection across Programming Languages, in Volume 48; - Stemming Indonesian, in Volume 38; - Video Cut Detection using Frame Windows, in Volume 38;
  • Tahaghoghi, Seyed M. M. - Exploring Human Judgement of Digital Imagery, in Volume 62;
  • Tai, Hsiu Ling - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
  • Taib, Ronnie - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
  • Takagi, Toshihisa - A Pathway Editor for Literature-based Knowledge Curation, in Volume 29;
  • Takahashi, Naohisa - Redundant Parallel Data Transfer Schemes for the Grid Environment, in Volume 54;
  • Takaoka, Tadao - Combinatorial Generation by Fusing Loopless Algorithms, in Volume 51; - Efficient Algorithms for Solving Shortest Paths on Nearly Acyclic Directed Graphs, in Volume 41; - Improved Shortest Path Algorithms For Nearly Acyclic Directed Graphs, in Volume 62;
  • Takatsuka, Masahiro - Adding Filtering to Geometric Distortion to Visualize a Clustered Graph on Small Screens, in Volume 35; - Graph Interaction through Force-Based Skeletal Animation, in Volume 35; - Real-time 3D Finger Pointing for an Augmented Desk, in Volume 40; - Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction, in Volume 38; - The Geodesic Self-Organizing Map and Its Error Analysis, in Volume 38; - Three Dimensional Colour Pickers, in Volume 45; - Visualization of a Closed Three-Dimensional Surface using Portal-based Rendering, in Volume 60; - Visualizing Multivariate Network on the Surface of a Sphere, in Volume 60;
  • Takatsuko, Masahiro - Inclusion Tree Layout Convention : An Empirical Investigation, in Volume 24;
  • Takimoto, Eiji - Lower Bounds on Quantum Query Complexity for Read-Once Decision Trees with Parity Nodes, in Volume 94;
  • Talbot, Hugues - Unseeded Region Growing for 3D Image Segmentation, in Volume 2;
  • Talley, Sue - Bridging the Gap Between Theory and Practice in Preservice Education : The Use of Video Case Studies, in Volume 23;
  • Tam, Vincent W. L. - Information Retrieval in Structured Domains, in Volume 92;
  • Tan, Aik Choon - An Empirical Comparison of Supervised Machine Learning Techniques in Bioinformatics, in Volume 19;
  • Tan, Jefferson - Optimizing Tunneled Grid Connectivity across Firewalls, in Volume 99;
  • Tan, Kian-Lee - B-trees: Bearing Fruits of All Kinds, in Volume 5; - BLAST++ : A Tool for BLASTing Queries in Batches, in Volume 19; - Exploring Bit-Difference for Approximate KNN Search in High-dimensional Databases, in Volume 39;
  • Tan, Lei - Interoperability for Geospatial Analysis: a Semantics and Ontology-based Approach, in Volume 63;
  • Tan, Patrick - Support Vector Machine Approach for Cancer Detection Using Amplified Fragment Length Polymorphism (AFLP) Screening Method, in Volume 29;
  • Tanaka, Jiro - FindFlow: Visual Interface for Information Search based on Intermediate Results, in Volume 60; - Information Gathering Support Interface by the Overview Presentation of Web Search Results, in Volume 60; - NeL2: Network Drawing Tool for Handling Layered Structured Network Diagram, in Volume 60; - Ripple Presentation for Tree Structures with Historical Information, in Volume 60;
  • Tanbeer, Syed Khairuzzaman - ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns, in Volume 87;
  • Tandianus, Jeff E. - Video Cataloguing and Browsing, in Volume 11;
  • Tang, Anthony - Display and Presence Disparity in Mixed Presence Groupware, in Volume 28;
  • Tang, Jia - An Agent-based Peer-to-Peer Grid Computing Architecture - Convergence of Grid and Peer-to-Peer Computing, in Volume 54;
  • Tang, Jianmin - An open problem: (4; g)-cages with odd g <= 5 are tightly connected, in Volume 65;
  • Tang, Qing - Compressed Video Transmission over Digital Networks : Analysis and Design, in Volume 22;
  • Tang, Sy-sen - Gene Expression Data Clustering and Visualization Based on a Binary Heirarchical Clustering Framework, in Volume 19;
  • Taniar, David - Aggregation Query Model for OODBMS, in Volume 10; - ODMG Extension of Composite Objects in OODBMS: A Proposal, in Volume 10;
  • Tao, Trevor - A Useful Bound for Region Merging Algorithms in a Bayesian Model, in Volume 16;
  • Tao, Will - A Local Broker Enabled MobiPass Architecture for Enhancing Trusted Interaction Efficiency, in Volume 74;
  • Tari, Zahir - A CORBA Cooperative Cache Approach with Popularity Admission and Routing Mechanism, in Volume 5; - The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed Workloads, in Volume 91;
  • Tatsuta, Makoto - Type Checking and Inference for Polymorphic and Existential Types, in Volume 94;
  • Taylor, Hamish - Condensative Stream Query Language for Data Streams, in Volume 63;
  • Taylor, John L. - Steve Austin Versus the Symbol Grounding Problem, in Volume 37;
  • Taylor, Ken - Applying Enterprise Architectures and Technology to the Embedded Devices Domain, in Volume 21;
  • Taylor, Kerry - Implementing Role Based Access Control for Federated Information Systems on the Web, in Volume 21; - Large scale colour ontology generation with XO, in Volume 58; - The Semantics of Water, in Volume 72; - Towards Scalable Ontology Engineering Patterns: Lessons Learned from an Experiment based on W3Cs Part-whole Guidelines, in Volume 72; - What is Required in Business Collaboration?, in Volume 92;
  • Taylor, Paul R. - Patterns of the Prairie Houses, in Volume 13;
  • Taylor, Richard - Effective Prediction and its Computational Complexity, in Volume 65;
  • te Braak, Paul - Temporal Pattern Matching for the Prediction of Stock Prices, in Volume 84;
  • Teague, Donna - A People-First Approach to Programming, in Volume 95; - Collaborative learning - towards a solution for novice programmers, in Volume 78; - Losing Their Marbles: Syntax-Free Programming for Assessing Problem-Solving Skills, in Volume 95;
  • Teague, Vanessa - On The Complexity of Manipulating Elections, in Volume 65; - QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks, in Volume 62;
  • Teasdale, R. D. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
  • Teisseire, Maguelonne - S2MP: Similarity Measure for Sequential Patterns, in Volume 87;
  • Teltzrow, Maximilian - Privacy Conflicts in CRM Services for Online Shops: A Case Study, in Volume 14;
  • Tempero, Ewan - A Comparison and Evaluation of Interpolation Methods for Visualising Discrete 2D Survey Data, in Volume 35; - A Framework for InteractiveWeb-Based Visualization, in Volume 50; - Delegation Diagrams: Visual Support for the Development of Object-Oriented Designs, in Volume 28; - Dynamic Measurement of Polymorphism, in Volume 62; - Essential Use Cases and Responsibility in Object-Oriented Development, in Volume 4; - Evaluating Scalable Vector Graphics for Use in Software Visualisation, in Volume 24; - Experiences in Teaching Quality Attribute Scenarios, in Volume 95; - Generating Web-based User Interfaces for Diagramming Tools, in Volume 40; - How (Not) To Help People Test Drive Code, in Volume 7; - Identifying Refactoring Opportunites by Identifying Dependency Cycles, in Volume 48; - Jooj: Real-Time Support For Avoiding Cyclic Dependencies, in Volume 62; - JWS: A Flexible Web Service, in Volume 74; - Metaphor and Metonymy in Object-Oriented Design Patterns, in Volume 4; - On Measuring Java Software, in Volume 74; - Patterns for Essential Use Case Bodies, in Volume 13; - Reflections on CRC Cards and OO Design, in Volume 10; - Sokoban: A System Object Case Study, in Volume 10; - Supporting Software Reuse by the Individual Programmer, in Volume 48; - Teaching the Evaluation of Object-Oriented Designs, in Volume 20; - The CRSS Metric for Package Design Quality, in Volume 62; - Visualising Reusable Software Over The Web, in Volume 9;
  • Temple, Mark - Learning Causal Networks from Microarray Data, in Volume 73; - Learning from Ontological Annotation : an Application of Formal Concept Analysis to Feature Construction in the Gene Ontology, in Volume 85;
  • Tena, J. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
  • Tenenberg, Josh - Multi-Institutional Teaching Communities in Computer Education, in Volume 52;
  • Teo, Yong M. - An Approach to Vickrey-based Resource Allocation in the Presence of Monopolistic Sellers, in Volume 99;
  • Teo, Yong Meng - DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids, in Volume 68;
  • Teoh, Soon Tee - BiblioViz: A System for Visualizing Bibliography Information, in Volume 60;
  • ter Hofstede, A. H. M. - Product Flow Analysis in Distribution Networks with a Fixed Time Horizon, in Volume 74;
  • ter Hofstede, Arthur H.M. - On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling, in Volume 53;
  • Terada, Routo - A New Version of the RC6 Algorithm, Stronger against \chi^2 Cryptanalysis, in Volume 98;
  • Teredesai, Ankur - Modeling Proliferation of Ideas in Online Social Networks, in Volume 61;
  • Terracina, Giorgio - A Framework for Improving Protein Structure Predictions by Teamwork, in Volume 19;
  • Terrasse, Marie-Noelle - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
  • Thaicharoen, Supphachai - Structure-Based Document Model with Discrete Wavelet Transforms and Its Application to Document Classification, in Volume 87;
  • Thalheim, Bernhard - Co-Design of Structuring, Functionality, Distribution, and Interactivity for Information Systems, in Volume 31; - Component-Driven Engineering of Database Applications, in Volume 53; - Conceptual Application Domain Modelling, in Volume 96; - Context Analysis: Toward Pragmatics of Web Information Systems Design, in Volume 79; - Context-Aware Web Information Systems, in Volume 31; - Database Collaboration Instead of Integration, in Volume 43; - Database Component Ware, in Volume 17; - Operational Semantics of Transactions, in Volume 17;
  • Tham, Lawrence - Support Vector Machine Approach for Cancer Detection Using Amplified Fragment Length Polymorphism (AFLP) Screening Method, in Volume 29;
  • Thangarajah, John - Representation and Reasoning for Goals in BDI Agents, in Volume 4;
  • Thevathayan, Charles - Transforming learning of programming: a mentoring project, in Volume 78;
  • Thiagarajan, Rajesh - A Native Ontology Approach for Semantic Service Descriptions, in Volume 72;
  • Thies, Gunnar - Modelling Web-Oriented Architectures, in Volume 96;
  • Thoai, N. - An Approach to Vickrey-based Resource Allocation in the Presence of Monopolistic Sellers, in Volume 99;
  • Thom, James A. - Content-based Image Retrieval Using Image Regions as Query Examples, in Volume 75; - Drill Across and Visualization of Cubes with Non-conformed Dimensions, in Volume 75; - Exploring Human Judgement of Digital Imagery, in Volume 62; - Video Cut Detection using Frame Windows, in Volume 38;
  • Thomas, Bruce - Target Motion Analysis Visualisation, in Volume 45;
  • Thomas, Bruce H. - Augmenting Image Place AR 3D Interactions for Wearable Computers, in Volume 93; - Comparison of techniques for mixed-space collaborative navigation, in Volume 93; - Developing a Location Based Tourist Guide Application, in Volume 21; - Enabling Co-located Ad-hoc Collaboration on Shared Displays, in Volume 76; - Evaluation of a Universal Interaction and Control Device for use within Multiple Heterogeneous Display Ubiquitous Environments, in Volume 50; - Evaluation of User Satisfaction and Learnability for Outdoor Augmented Reality Gaming, in Volume 50; - Groupware Support in the Windowing System, in Volume 64; - Interaction Modes for Augmented Reality Visualization, in Volume 9; - Keg Master : a Graph-Aware Visual Editor for 3D Graphs, in Volume 18; - Lightweight User Interfaces for Watch Based Displays, in Volume 40; - Modeling Reach For Use in User Interface Design, in Volume 64; - Outdoor Augmented Reality Gaming on Five Dollars a Day, in Volume 40; - Tangible User Interaction Using Augmented Reality, in Volume 7; - The Tinmith System - Demonstrating New Techniques for Mobile Augmented Reality Modelling, in Volume 7; - TIDL: Mixed Presence Groupware Support for Legacy and Custom Applications, in Volume 50;
  • Thomas, Martyn - Engineering Judgement, in Volume 47;
  • Thomas, Pete - Measuring Improvement in Latent Semantic Analysis-Based Marking Systems: Using a Computer to Mark Questions about HTML, in Volume 66;
  • Thomas, Richard C. - An Investigation into Keystroke Latency Metrics as an Indicator of Programming Performance, in Volume 42; - Developing Case Studies to Enhance Student Learning, in Volume 42; - Developing the Software Engineering Team, in Volume 42; - Difficulties experienced by students in maintaining object-oriented systems: an empirical study, in Volume 66; - Tight Spirals and Industry Clients: The Modern SE Education Experience, in Volume 42;
  • Thomas, Theda - Cooperative Learning and Object-Orientated Development Methods, in Volume 23;
  • Thomborson, Clark - A Framework for Obfuscated Interpretation, in Volume 32; - A Functional Taxonomy for Software Watermarking, in Volume 4; - Foundation for Systems Security, in Volume 98; - Manufacturing Opaque Predicates in Distributed Systems for Code Obfuscation, in Volume 48; - Passwords and Perceptions, in Volume 98; - Preliminary Security Specification for New Zealand's igovt System, in Volume 98; - Tamper-proofing Software Watermarks, in Volume 32;
  • Thompson, Errol - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52; - Applications of variation theory in computing education, in Volume 88; - Bloom's Taxonomy for CS assessment, in Volume 78; - Exploring Conceptions of programming, in Volume 52; - Holistic assessment criteria - Applying SOLO to programming projects, in Volume 66; - The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78; - Using a subject area model as a learning improvement model, in Volume 52;
  • Thomson, Kirsten - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
  • Thongkam, Jaree - Breast Cancer Survivability via AdaBoost Algorithms, in Volume 80;
  • Thornton, John - An Efficient Method for Indexing Now-relative Bitemporal data, in Volume 27;
  • Thredgold, J. - Modelling Smart Security for Classified Rooms with DOVE, in Volume 12;
  • Thurbon, Joe - Experimental Evaluation of a Program Visualisation Tool for Use in Computer Science Education, in Volume 24;
  • Ti, Yen-Wu - Testing Embeddability Between Metric Spaces, in Volume 77;
  • Tian, Lin - Improved Shortest Path Algorithms For Nearly Acyclic Directed Graphs, in Volume 62;
  • Tian, Ye Henry - Mechanically Verifying Correctness of CPS Compilation, in Volume 51;
  • Tibbey, Grant - WAT - A Tool for Classifying Learning Activities from a Log File, in Volume 66;
  • Tickle, Alan - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42; - Using a Network Simulation Tool to Engage Students in Active Learning Enhances Their Understanding of Complex Data Communications Concepts., in Volume 42;
  • Tilakaratne, Chandima - Effectiveness of Using Quantified Intermarket Influence for Predicting Trading Signals of Stock Markets, in Volume 70;
  • Tilbrook, Marc - Annotating Websites with Machine-processable Information in Controlled Natural Language, in Volume 72;
  • Tin, Yiu Shing Terry - Provably Secure Key Exchange: an Engineering Approach, in Volume 21;
  • Ting, H. F. - An Optimal Broadcasting Protocol for Mobile Video-on-Demand, in Volume 65;
  • Ting, Zhao - 3D Reconstruction of Single Picture, in Volume 36;
  • Tjondronegoro, Dian - A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights, in Volume 38; - Extensible Detection and Indexing of Highlight Events in Broadcasted Sports Video, in Volume 48;
  • Todd, E. - What Makes a Good User Interface Pattern Language?, in Volume 28;
  • Tojo, Satoshi - IC-based Ontology Expansion in Devouring Accessibility, in Volume 58; - Logical Aspects of Events: Quantification, Sorts, Composition and Disjointness, in Volume 58;
  • Tokoro, Ken - Improvements of TLAESA Nearest Neighbour Search Algorithm and Extension to Approximation Search, in Volume 48;
  • Toleman, Mark - An evaluation of electronic individual peer assessment in an introductory programming course, in Volume 88; - Chick Sexing and Novice Programmers: Explicit Instruction of Problem Solving Strategies, in Volume 52; - Introductory Programming: What's Happening Today and Will There Be Anyone to Teach Tomorrow?, in Volume 30; - Language Tug-Of-War: Industry Demand and Academic Choice, in Volume 20; - Teaching and Assessing Programming Strategies Explicitly, in Volume 95;
  • Tolhurst, Denise - A New Approach to a First Year Undergraduate Information Systems Course, in Volume 20; - Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52; - Organisational Factors Affecting Teachers' Use and Perception of Information & Communications Technology, in Volume 46; - The Influence of Web-supported Independent Activities and Small Group Work on Students' Epistemological Beliefs, in Volume 30;
  • Tomas, R. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
  • Tombs, David - Measuring Railway Signals Passed At Danger, in Volume 86;
  • Tomita, Etsuji - Protein Side-chain Packing Problem: A Maximum Edge-weight Clique Algorithmic Approach, in Volume 29;
  • Tomita, Kohji - The Relative Completeness of a Version of CTL*, in Volume 41;
  • Tomita, Shinji - Spatial analysis of centralization and decentralization in the population migration network, in Volume 60;
  • Toney, Aaron P. - Modeling Reach For Use in User Interface Design, in Volume 64;
  • Toper, Rodney - Rewriting General Conjunctive Queries Using Views, in Volume 5;
  • Topor, Rodney - Removing XML Data Redundancies Using Functional and Equality-Generating Dependencies, in Volume 39;
  • Toshniwal, Durga - Finding Similarity in Time Series Data by Method of Time Weighted Moments, in Volume 39;
  • Townley, David - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
  • Towsey, Michael W. - Bacterial Promoter Modeling and Prediction for E. Coli and B. Subtilis with Beagle, in Volume 73;
  • Toyn, Ian - Transformation Rules for Z, in Volume 94;
  • Toyoda, Masashi - WEB Community Mining and WEB Log Mining: Commodity Cluster Based Execution, in Volume 5;
  • Tran, Kha - Indoor Location Prediction Using Multiple Wireless Received Signal Strengths, in Volume 87;
  • Tran, Minh Hong - Extended Radar View and Modification Director: Awareness Mechanisms for Synchronous Collaborative Authoring, in Volume 50; - SWIM: An Alternative Interface for MSN Messenger, in Volume 64;
  • Tran, Tien - Combining Structure and Content Similarities for XML Document Clustering, in Volume 87;
  • Tran, Van T. K. - Mobile Information Exchange and Integration: From Query to Application Layer, in Volume 92;
  • Trawick-Smith, Jeff - The Role of the Teacher in Scaffolding Children's Interactions in a Technological Environment: How a Technology Project is Transforming Preschool Teacher Practices in Urban Schools, in Volume 34;
  • Traynor, Des - Automated Assessment in CS1, in Volume 52;
  • Trentelman, Kerry - Factorising Temporal Specifications, in Volume 41;
  • Tretiakov, Alexei - Using Reflection for Querying XML Documents, in Volume 49;
  • Trigueiros, Maria Jos - A Data Quality Metamodel Extension to CWM, in Volume 67;
  • Trinh, Thu - Constraint Acquisition - You Can Chase but You Cannot Find, in Volume 79; - Know your Limits: Enhanced XML Modeling with Cardinality Constraints, in Volume 83;
  • Trinidad, Sue - A Journey of Networking Learners Down Under: A Reflection of the Evolution of ICT in Western Australian Primary Schools, in Volume 8;
  • Tripathi, Praveen Kumar - Identifying Stock Similarity Based on Multi-event Episodes, in Volume 87;
  • Tritilanunt, Suratose - Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets, in Volume 62;
  • Truong, Nghi - A Web Based Environment for Learning to Program, in Volume 16; - Automated Feedback for 'Fill in the Gap' Programming Exercises, in Volume 42; - Static Analysis of Students' Java Programs, in Volume 30;
  • Truyen, Tran The - Preference Networks: Probabilistic Models for Recommendation Systems, in Volume 70;
  • Tsai, Jeffery - Modelling and Simulation of Routing Protocol for Mobile Ad Hoc Networks Using Coloured Petri Nets, in Volume 12;
  • Tsang, W.W. - Tuning the Collision Test for Power, in Volume 26;
  • Tse - Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks, in Volume 75;
  • Tse, Edward - Rapidly Prototyping Single Display Groupware through the SDGToolkit, in Volume 28;
  • Tso, C.W. - Tuning the Collision Test for Power, in Volume 26;
  • Tsoi, Ah Chung - A ConceptLink Graph for Text Structure Mining, in Volume 91;
  • Tsukamoto, Masahiko - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
  • Tu, Jiyuan - A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68;
  • Tu, Yu-Cheng - Preliminary Security Specification for New Zealand's igovt System, in Volume 98;
  • Tue, Minh - Graphics Hardware based Efficient and Scalable Fuzzy C-Means Clustering, in Volume 87;
  • Tun, Nwe Ni - IC-based Ontology Expansion in Devouring Accessibility, in Volume 58; - Semantic Enrichment in Ontologies for Matching, in Volume 72;
  • Tuovinen, Juhani E. - Designing Better CBL than Face-to-Face Tutoring by Incorporating Teacher-like Feedback and Guidance in Accounting, in Volume 8; - Gestalt Theory in Visual Screen Design - A New Look at an Old Subject, in Volume 8;
  • Tupakula, Udaya Kiran - A Practical Method to Counteract Denial of Service Attacks, in Volume 16; - Analysis of Traceback Techniques, in Volume 54;
  • Turcsanyi-Szabo, Marta - Drawing a Parallel between Computational Metaphors, Processes, Games and Learning at an Early Age , in Volume 34;
  • Turner, Daniel - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
  • Turpin, Andrew - An Approach to Phrase Selection for Offline Data Compression, in Volume 4; - An Investigation on a Community's Web Search Variability, in Volume 74; - Do Clarity Scores for Queries Correlate with User Performance?, in Volume 27; - Suffix Arrays: What Are They Good For?, in Volume 49;
  • Turull-Torres, Jose Maria - On the Computation of Approximations of Database Queries, in Volume 27;
  • Tutty, Jodi - Experiences from a Wireless-enabled Tablet Classroom, in Volume 42; - Information Technology Online: A Knowledge Framework for Curriculum Externalisation, in Volume 52; - Tablet classroom interactions, in Volume 52;
  • Twardy, Charles - Layout of Bayesian Networks, in Volume 38;
  • Tweats, Rob - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
  • Tyerman, Susan P. - Reducing Cognitive Overhead on the World Wide Web, in Volume 4;
  • Tynan, Richard - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
  • Tyrelle, Greg D. - A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data, in Volume 19;
Top of List

U

  • Ueda, Eduardo T. - A New Version of the RC6 Algorithm, Stronger against \chi^2 Cryptanalysis, in Volume 98;
  • Uemura, Shunsuke - A Path-based Relational RDF Database, in Volume 39;
  • Uitdenbogerd, Alexandra - A Comparative Study of Probabalistic and Language Models for Information Retrieval, in Volume 75;
  • Uitdenbogerd, Alexandra L. - Automatic Music Classification Problems, in Volume 26; - Music Ranking Techniques Evaluated, in Volume 4;
  • Ullman, Jeffrey D. - Gradiance On-Line Accelerated Learning, in Volume 38;
  • Ulm, Sean - Grid services for e-archaeology, in Volume 82;
  • Umer, Muhammad - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
  • Umigai, Akimichi - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
  • Upstill, Trystan - How Valuable is External Link Evidence When Searching Enterprise Webs?, in Volume 27;
  • Urting, David - A Tool for Component Based Design of Embedded Software, in Volume 10;
  • Utting, Mark - Transformation Rules for Z, in Volume 94;
  • Uustalu, Tarmo - Compositional Type Systems for Stack-Based Low-Level Languages, in Volume 51;
  • Uzun, Alper - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
Top of List

V

  • Vadaharajan, Vijay - A Secure Mental Poker Protocol over the Internet, in Volume 21;
  • Vadapalli, Soujanya - View Relevance Driven Materialized View Selection in Data Warehousing Environment, in Volume 5;
  • Vaidya, Jaideep - An Architecture for Privacy-preserving Mining of Client Information, in Volume 14;
  • Valaskala, Keeko - Why should we bore students when teaching CS?, in Volume 88;
  • Vale, Paul - Having Fun and Raising Standards, in Volume 34;
  • Vallance, Scott - Multi-Perspective Images for Visualisation, in Volume 11; - Rendering Multi-Perspective Images with Trilinear Projection, in Volume 48;
  • Valls, M. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
  • Valluri, Satyanarayana R. - View Relevance Driven Materialized View Selection in Data Warehousing Environment, in Volume 5;
  • Valverde, Francisco - An Abstract Interaction Model for a MDA Software Production Method, in Volume 83;
  • Vamplew, Peter - An Anti-Plagiarism Editor for Software Development Courses, in Volume 42; - Inference of Gene Expression Networks Using Memetic Gene Expression Programming, in Volume 91; - Using Corpus Analysis to Inform Research into Opinion Detection in Blogs, in Volume 70;
  • Van Achteren, Tanja - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
  • Van Baelen, Stefan - A Tool for Component Based Design of Embedded Software, in Volume 10;
  • Van Berendonck, Christopher - Bubbleworld : A New Visual Information Retreival Technique, in Volume 24;
  • van Bommel, P. - Transformation selection for aptness-based web retrieval, in Volume 39;
  • van den Berg, L. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
  • van der Aalst, Wil - On the Correlation between Process Model Metrics and Errors, in Volume 83;
  • van der Aalst, Wil M.P. - On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling, in Volume 53;
  • van der Meyden, Ron - A Linear Time Algorithm for Pricing European Sequential Barrier Options, in Volume 65;
  • van Dieten, H. - Slash 21 : A New School and a New Way of Learning, in Volume 23;
  • van Gils, B. - Transformation selection for aptness-based web retrieval, in Volume 39;
  • van Kouwen, Frank - Improving Environmental Decision-making: Bridging the Gap between Conceptual Modelling and Quantitative Analyses with Quasta, in Volume 83;
  • Vandewoude, Yves - A Tool for Component Based Design of Embedded Software, in Volume 10;
  • Vandierendonck, Hans - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
  • Vanoirbeek, C. - Automating XML document Transformations: A conceptual modelling based approach, in Volume 31;
  • Vanselow, Kerstin - 2D Visualisation of SMFS Data on Membrane Proteins, in Volume 83;
  • Varadharajan, Vijay - A Practical Method to Counteract Denial of Service Attacks, in Volume 16; - Analysis of Traceback Techniques, in Volume 54;
  • Vartiainen, Tero - Student life in computing: a variety of conflicting moral requirements, in Volume 78;
  • Vasudevan, Amit - A High Performance Kernel-Less Operating System Architecture, in Volume 38; - SPiKE: Engineering Malware Analysis Tools using Unobtrusive Binary-Instrumentation, in Volume 48;
  • Vasudevan, Venkatesh - Implementation of a Triple Modular Redundant FPGA based Safety Critical Systems for Reliable Software Execution, in Volume 69;
  • Vaughan, Francis A. - Communication Performance Issues for Two Cluster Computers, in Volume 16;
  • Veelo, Nicole - Conditions and Possibilities for Integration of ICT in Open Teaching in Secondary Schools - A Comparative Study in Preparation, in Volume 23;
  • Velikovsky, Joe - Outdoor Augmented Reality Gaming on Five Dollars a Day, in Volume 40;
  • Venables, Anne - Programming students need instant feedback!, in Volume 20;
  • Venkatesan, Ramarathnam - Comparison of Texts Streams in the Presence of Mild Adversaries, in Volume 44;
  • Venkatesh, Svetha - Indoor Location Prediction Using Multiple Wireless Received Signal Strengths, in Volume 87; - Preference Networks: Probabilistic Models for Recommendation Systems, in Volume 70;
  • Venugopal, Srikumar - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44; - A Portal for Grid-enabled Physics, in Volume 44;
  • Verbyla, Janet L.M. - An Online Programming Assessment Tool, in Volume 20;
  • Verelst, Jan - When are two Workflows the Same?, in Volume 41;
  • Verenikina, Irina - Child's Play: Computer Games, Theories of Play and Children's Development, in Volume 34;
  • Verheecke, Bart - Specifying and Implementing the Operational Use of Constraints in Object-Oriented Applications, in Volume 10;
  • Verity, Dominic R. - A Pattern Enforcing Compiler (PEC) for Java: Using the Compiler, in Volume 43;
  • Vernik, Michael - e-Ghosts: Leaving Virtual Footprints in Ubiquitous Workspaces, in Volume 28;
  • Vernik, Rudi - e-Ghosts: Leaving Virtual Footprints in Ubiquitous Workspaces, in Volume 28; - Enterprise-Enabled Ubiquitous Workspaces, in Volume 25; - Information Visualisation using Composable Layouts and Visual Sets, in Volume 9; - Interaction Modes for Augmented Reality Visualization, in Volume 9; - Keg Master : a Graph-Aware Visual Editor for 3D Graphs, in Volume 18; - Rapid Assembly and Deployment of Domain Visualisation Solutions, in Volume 9; - Tangible User Interaction Using Augmented Reality, in Volume 7;
  • Verrijn-Stuart, A.A. - On Utility-based Selection of Architecture-Modelling Concepts, in Volume 43;
  • Vesisenaho, Mikko - Contextualising information and communications technology in developing countries, in Volume 88;
  • Vikas, Om - Multilingual ICT Education: Language Observatory as a Monitoring Instrument, in Volume 46;
  • Vilela, Valerio Moyses - Improving Productivity and Quality of GIS Databases Design using an Analysis Pattern Catalog, in Volume 43;
  • Vilkomir, Sergiy A. - Segregated Failures Model for Availability Evaluation of Fault-Tolerant Systems, in Volume 48;
  • Viller, Stephen - Talking about watching: Using the Video Card Game and wiki-web technology to engage IT students in developing observational skills, in Volume 20;
  • Vincent, Jill - A Technological Environment for Promoting Mathematical Reasoning : A Dynamic Approach to Geometric Proof, in Volume 23;
  • Vincent, John - Individual Differences, Technology and the Teacher of the Future, in Volume 23; - MicroWorlds and the Integrated Brain, in Volume 8;
  • Violich, Stephen - Combinatorial Generation by Fusing Loopless Algorithms, in Volume 51;
  • Viswanathan, Kapali - Five Sealed-bid Auction Models, in Volume 21;
  • Vitter, Jeffery S. - Aggregate Predicate Support in DBMS, in Volume 5;
  • Volkmer, Timo - Exploring Human Judgement of Digital Imagery, in Volume 62; - Video Cut Detection using Frame Windows, in Volume 38;
  • Volkov, Vasily - Cloth Animation with Adaptively Refined Meshes, in Volume 38;
  • von Konsky, Brian R. - Assessing the capability and maturity of capstone software engineering projects, in Volume 78; - Engaging Undergraduates in Discussions about Ethics in Computing, in Volume 66; - The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52; - Using PSP to Evaluate Student Effort in Achieving Learning - Outcomes in a Software Engineering Assignment, in Volume 42;
  • Vossen, Gottfried - ActiveTags: Making Tags More Useful Anywhere on the Web, in Volume 92; - Modelling Web-Oriented Architectures, in Volume 96;
  • Vu, Linh - Hierarchical Verification Environment, in Volume 55;
  • Vuylsteker, Pascal - eScience Curricula at Two Australian Universities, in Volume 42;
  • Vyatkina, Kira - Linear Axis for Planar Straight Line Graphs, in Volume 94;
Top of List

W

  • Wagenhals, Lee W. - Operational Planning using Web-Based Interfaces to a Coloured Petri Net Simulator of Influence Nets, in Volume 12; - Synthesizing Executable Models of Object Oriented Architectures, in Volume 12;
  • Wagner, Michael - Audio-Visual Multimodal Fusion for Biometric Person Authentication and Liveness Verification, in Volume 57; - Video to the Rescue, in Volume 56;
  • Wahlstrom, Kirsten - On the Impact of Knowledge Discovery and Data Mining, in Volume 1; - The motivation and proposition of a privacy-enhancing architecture for operational databases, in Volume 68;
  • Waldeck, Peter - Implementation of a Triple Modular Redundant FPGA based Safety Critical Systems for Reliable Software Execution, in Volume 69;
  • Walker, Cecily - Transforming learning of programming: a mentoring project, in Volume 78;
  • Wallace, Andrew - Rapid Visual Flow: How Fast Is Too Fast?, in Volume 28;
  • Wan Zainon, Wan Nazmee - Visualising Phylogenetic Trees, in Volume 50;
  • Wan, Jacky W.W. - Mining Association Rules from XML Data using XQuery, in Volume 32;
  • Wanas, Nayer - A Study of Local and Global Thresholding Techniques in Text Categorization, in Volume 61;
  • Wand, Yair - A Framework Supporting the Utilization of Domain Knowledge Embedded in Software, in Volume 83;
  • Wandmacher, Tonio - Extraction, evaluation and integration of lexical-semantic relations for the automated construction of a lexical ontology, in Volume 85;
  • Wang, Bill B. - A Comparative Study for Domain Ontology Guided Feature Extraction, in Volume 16;
  • Wang, Bo - A Combined Model and a Varied Gibbs Sampling Algorithm Used for Motif Discovery, in Volume 29;
  • Wang, Daolong - Mega Weaver: A Simple Iterative Approach for BAC Consensus Assembly, in Volume 29;
  • Wang, Guoren - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75; - M+-tree : A New Dynamical Multidimensional Index for Metric Spaces, in Volume 17;
  • Wang, Hao - BLAST++ : A Tool for BLASTing Queries in Batches, in Volume 19;
  • Wang, Henry C. - Cataloging and Search Engine for Video Library, in Volume 2;
  • Wang, Honghui - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
  • Wang, Hongshu - A Statistical Method for Assessment of 3-D Medical Image Registration, in Volume 2;
  • Wang, Hua - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61; - A Flexible Payment Scheme and its Permission-Role Assignment, in Volume 16; - A Framework for Role-based group delegation in distributed environment, in Volume 48; - A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses, in Volume 61; - A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73; - An efficient hash-based algorithm for minimal k-anonymity, in Volume 74; - Anonymous Access Scheme for Electronic Services, in Volume 26; - Authorization Algorithms for the Mobility of User-Role Relationship, in Volume 38; - Conditional Purpose Based Access Control Model for Privacy Protection, in Volume 92; - Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations, in Volume 17; - Integrating Recommendation Models for Improved Web page prediction accuracy, in Volume 74; - Microdata Protection Through Approximate Microaggregation, in Volume 91; - Priority Driven K-Anonymisation for Privacy Protection, in Volume 87; - Privacy-aware Access Control with Generalization Boundaries, in Volume 91; - Ticket-Based Service Access Scheme for Mobile Users, in Volume 4;
  • Wang, Huaqing - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38;
  • Wang, Huaxiong - Formal Analysis of Card-based Payment Systems in Mobile devices, in Volume 54; - Formal Security Analysis of Australian E-passport Implementation, in Volume 81;
  • Wang, J. R. - Survey of Sports Video Analysis: Research Issues and Applications, in Volume 36;
  • Wang, Jing - 2D Visualisation of SMFS Data on Membrane Proteins, in Volume 83;
  • Wang, Junhu - Removing XML Data Redundancies Using Functional and Equality-Generating Dependencies, in Volume 39; - Rewriting General Conjunctive Queries Using Views, in Volume 5; - Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75;
  • Wang, Lijian - Roller Interface for Mobile Device Applications, in Volume 64;
  • Wang, Lusheng - Exact Pattern Matching for RNA Secondary Structures, in Volume 29;
  • Wang, Meiqing - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38;
  • Wang, Qiang - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
  • Wang, Qing - A Heuristic Approach to Cost-Efficient Derived Horizontal Fragmentation of Complex Value Databases, in Volume 63; - A Heuristic Approach to Cost-Efficient Fragmentation and Allocation of Complex Value Databases, in Volume 49; - A Typed Higher-Order Calculus for Querying XML Databases, in Volume 75; - Deriving Relation Keys from XML Keys, in Volume 17; - Line Drawing in Virtual Reality using a Game Pad, in Volume 50;
  • Wang, R. - Media Streaming Synchronisation and Video Interaction : A Survey, in Volume 22;
  • Wang, Ruiyi - The Development of an Online Video Browing System, in Volume 11;
  • Wang, Tsuo-Jung - Calculating the Meeting Point of Scattered Robots on Weighted Terrain Surfaces, in Volume 41;
  • Wang, Wei - Path Materialization Revisited: An Efficient Storage Model for XML Data, in Volume 5;
  • Wang, Xianbing - DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids, in Volume 68;
  • Wang, Xiaoxing - A Quantitative Analysis for Decomposing Visual Signal of the Gaze Displacement, in Volume 11; - Visual Representation Model for Motion Direction Selectivity, in Volume 22;
  • Wang, Xing - Building Multi-Device, Component-based, Thin-client Groupware: Issues and Experiences, in Volume 7;
  • Wang, Xiu Ying - Elastic Medical Image Registration Based on Image Intensity, in Volume 11; - Novel Elastic Registration for 2-D Medical and Gel Protein Images, in Volume 19;
  • Wang, Yefeng - An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology, in Volume 68;
  • Wang, Zhong - Student timesheets can aid in curriculum coordination, in Volume 66;
  • Ward, Roberta - Funktion Zusammen: Two Schools, One Class and German LOTE in Rural Queensland, in Volume 8;
  • Wark, Tim - Audio-Visual Speaker Verification using Continuous Fused HMMs, in Volume 56;
  • Warner, John W. - An Empirical Study of Junior Secondary Students' Expression of Algorithms in Natural Language, in Volume 8;
  • Warren, Ian - Automated Usability Testing Framework, in Volume 76; - Teaching Patterns and Software Design, in Volume 42;
  • Warren, James R. - Automatically Generated Consumer Health Metadata Using Semantic Spaces, in Volume 80; - Evaluation of User Satisfaction and Learnability for Outdoor Augmented Reality Gaming, in Volume 50; - Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
  • Warren, Matthew - The Issue of Ethics in Electronic Commerce, in Volume 1;
  • Warren, P.R. - Interactive Visualisation of Large Multivariate Datasets on the World-Wide Web, in Volume 9;
  • Warren, Paul - Detecting Stress in Spoken English using Decision Trees and Support Vector Machines, in Volume 32;
  • Warren, Peter - Learning Models for English Speech Recognition, in Volume 26; - Learning to Program: Spreadsheets, Scripting and HCI, in Volume 30;
  • Washizaki, Hironori - Dynamic Hierarchical Undo Facility in a Fine-Grained Component Environment, in Volume 10;
  • Wassen, Martin J. - Improving Environmental Decision-making: Bridging the Gap between Conceptual Modelling and Quantitative Analyses with Quasta, in Volume 83;
  • Watanabe, Isamu - Generation of Relevance Maps and Navigation in A Digital Book, in Volume 60;
  • Watson, Richard - A Framework for Role-based group delegation in distributed environment, in Volume 48; - An evaluation of electronic individual peer assessment in an introductory programming course, in Volume 88; - Chick Sexing and Novice Programmers: Explicit Instruction of Problem Solving Strategies, in Volume 52; - Incorporating programming strategies explicitly into curricula, in Volume 88; - Introductory Programming: What's Happening Today and Will There Be Anyone to Teach Tomorrow?, in Volume 30; - Language Tug-Of-War: Industry Demand and Academic Choice, in Volume 20; - Peer-to-Peer Form Based Web Information Systems, in Volume 49; - Teaching and Assessing Programming Strategies Explicitly, in Volume 95; - Towards a Definition and Model for Metadata File Systems, in Volume 74;
  • Weaver, Rob - A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments, in Volume 33;
  • Webb, Darren - Extensible Job Managers for Grid Computing, in Volume 16;
  • Webb, Geoff - Multi-Strategy Ensemble Learning, Ensembles of Bayesian Classifiers, and the Problem of False Discoveries, in Volume 87;
  • Webb, Ian - Raising the Standards : ICT and the Teacher of the Future, in Volume 23;
  • Webb, Ivan - A Systems Approach to ICT in School Education , in Volume 34;
  • Webber, Richard - Visualisation of the Minority Game Using a Mod, in Volume 35;
  • Weber, Derek - An Architecture for Multi-View Information Overlays, in Volume 35;
  • Weber, Gerald - A Platform-Independent Approach for Auditing Information Systems, in Volume 80; - User Interface Layout with Ordinal and Linear Constraints, in Volume 50;
  • Weckert, John - Computer Ethics - Why Bother?, in Volume 1; - Introduction - Computers and Philosophy, in Volume 37;
  • Wee, Hui - Optimal Joint Vendor-Buyer Inventory Strategy for Deteriorating Items with Salvage Value, in Volume 77;
  • Weghorn, Hans - Vowel recognition of English and German language using Facial movement(SEMG) for Speech control based HCI, in Volume 56;
  • Weinstein, David M. - Biomedical Computing and Visualization, in Volume 48;
  • Weir, Michael - Forward Chaining for Robot and Agent Navigation using Potential Fields, in Volume 26;
  • Weiskopf, D. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
  • Welch, Ian - A Board Game for Teaching Internet Engineering, in Volume 52; - Using Remotely Executing Software via a Mobile Device, in Volume 93;
  • Wells, Barbara - Using a Maze Case Study to Teach Object-Oriented Programming and Design Patterns, in Volume 30;
  • Wells, Lisa - Dynamic Design and Evaluation of Software Architecture in Critical Systems Development, in Volume 69;
  • Wells, Marilyn A - Conversational KM - Student Driven Learning, in Volume 30;
  • Wells, Marilyn A. - Commonsense ISD: An Empirical Approach to Teaching Systems Analysis and Design, in Volume 42;
  • Welzer, Tatjana - Early Assessment of Classification Performance, in Volume 32;
  • Wende, M. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
  • Wendelborn, Andrew L. - A Simplified Approach to Web Service Development, in Volume 54; - Alias Analysis for Exceptions in Java, in Volume 4; - Extensible Job Managers for Grid Computing, in Volume 16; - Stream-Components: Component based Stream computation on the Grid, in Volume 99;
  • Weng, Cheng G. - A New Evaluation Measure for Imbalanced Datasets, in Volume 87;
  • Werstein, Paul - Supporting Large Scale eResearch Infrastructures with Adapted Live Streaming Capabilities, in Volume 82;
  • Wesson, J.L. - Interactive Visualisation of Large Multivariate Datasets on the World-Wide Web, in Volume 9;
  • Whalley, Jacqueline - Bloom's Taxonomy for CS assessment, in Volume 78; - Decoding Doodles: Novice Programmers and Their Annotations, in Volume 66; - Interoperability for Geospatial Analysis: a Semantics and Ontology-based Approach, in Volume 63; - The BRACElet 2009.1 (Wellington) Specification, in Volume 95; - The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78;
  • Whalley, Jacqueline L. - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
  • Whigham, Peter - On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma, in Volume 26;
  • While, Lyndon - An Implementation of Parallel Pattern-Matching via Concurrent Haskell, in Volume 4; - Optimising Parallel Pattern-matching by Source-level Program Transformation, in Volume 38; - Path-Planning by Tessellation of Obstacles, in Volume 16;
  • While, R. Lyndon - A Dynamic Communication Algorithm for Digital Halftoning, in Volume 4;
  • White, Barbara - Experiences from a Wireless-enabled Tablet Classroom, in Volume 42;
  • White, Barbera - Information Technology Online: A Knowledge Framework for Curriculum Externalisation, in Volume 52; - Tablet classroom interactions, in Volume 52;
  • White, Hayley - Usability Evaluation of Library Online Catalogues, in Volume 50;
  • Whiting, Leigh - Boolean Affine Approximation with Binary Decision Diagrams, in Volume 94;
  • Whitmore, Thomas - Extending a Persistent Object Framework to Enhance Enterprise Application Server Performance, in Volume 5;
  • Wiander, Timo - Implementing the ISO/IEC 17799 standard in practice - experiences on audit phases, in Volume 81;
  • Wiangsripanawan, Rungrat - Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks, in Volume 68;
  • Wieczorek-Ghisso, Katazyna - Digital Communication of Children's Co-constructing Hypothesis, Negotiating Documentation Methods, in Volume 34;
  • Wiggberg, Mattias - Computer science students' experiences of decision making in project groups, in Volume 88; - Students learn CS in different ways: insights from an empirical study, in Volume 78;
  • Wigley, Grant - Hand Tracking For Low Powered Mobile AR User Interfaces, in Volume 40; - The Management of Applications for Reconfigurable Computing using an Operating System, in Volume 6;
  • Wijffels, Gene - Towards an understanding of protein-protein interaction network heirarchies. Analysis of DnaN-binding peptide motifs in members of protein families interacting with the eubacterial processivity clamp, the subunit of DNA Polymerase III, in Volume 19;
  • Wilcke, Winfried W. - Computer Architecture Challenges in the Next Ten Years, in Volume 6;
  • Wildman, Luke - Guidance for Def (Aust) 5679 Issue 2, in Volume 100; - Requirements Reformulation using Formal Specification: A Case Study, in Volume 12;
  • Wiles, Janet - Evolving Genetic Regulatory Networks Using an Artificial Genome, in Volume 29;
  • Wilkerson, Trena L. - Multiple Platform Videoconferencing to Support Teacher Education and Professional Development in Mathematics, in Volume 23;
  • Wilkins, Kevin - The Gestalt Principles of Similarity and Proximity Apply to Both the Haptic and Visual Grouping of Elements, in Volume 64;
  • Williams, Aaron - Generating Balanced Parentheses and Binary Trees by Prefix Shifts, in Volume 77;
  • Williams, Adepele - Controlling Inference: Avoiding P-level Reduction during Analysis, in Volume 68;
  • Williams, Ed - Airborne Collision Avoidance System, in Volume 47;
  • Williams, Graham - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
  • Williams, Graham J. - Exploratory Multilevel Hot Spot Analysis: Australian Taxation Office Case Study, in Volume 70;
  • Williams, Hugh E. - Access-Ordered Indexes, in Volume 26; - Genomic Information Retrieval, in Volume 17; - In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems, in Volume 26; - Indexing for Fast Categorisation, in Volume 16; - Stemming Indonesian, in Volume 38; - Variable-length Intervals in Homology Search, in Volume 29; - Video Cut Detection using Frame Windows, in Volume 38;
  • Williams, Kylie - Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking, in Volume 26;
  • Williams, Mary-Anne - Ontology Based Object Categorisation for Robots, in Volume 58;
  • Williams, Neville - Flexible Learning - Maximising Flexibility in a Subject with Large Student Numbers, in Volume 30;
  • Williams, R.N. - An online tool for learning collaboration and learning while collaborating., in Volume 52;
  • Wilson, David - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
  • Wilson, Laurence S. - Automatic Extraction of Lung Boundaries by a Knowledge-Based Method, in Volume 2; - Detection and Measurement of Hilar Region in Chest Radiograph, in Volume 22; - Detection of Abnormal Texture in Chest X-rays with Reduction of Ribs, in Volume 36; - Texture Classification using Multi-Scale Scheme, in Volume 36;
  • Winikoff, Michael - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26; - Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids, in Volume 4;
  • Winn, Tiffany - A Pattern Language for Pattern Language Structure, in Volume 13;
  • Winter, K. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
  • Winter, Kirsten - Model Checking Railway Interlocking Systems, in Volume 4; - Modelling Large Railway Interlockings and Model Checking Small Ones, in Volume 16;
  • Winter, P. - Some Structural and Geometric Properties of Two-Connected Steiner Networks, in Volume 65;
  • Winters, Titus - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52; - TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
  • Winton, Lyle J. - A Simple Virtual Organisation Model and Practical Implementation, in Volume 44;
  • Wiseman, Lorraine - Communicate in an E-Learning Community , in Volume 34;
  • Wishart, Ryan - Asad Pirzada, Ryan Wishart, Marius Portmann and Jadwiga Indulska, in Volume 91; - SuperstringRep: Reputation-enhanced Service Discovery, in Volume 38;
  • Witt, Rebecca J. - Reducing Cognitive Overhead on the World Wide Web, in Volume 4;
  • Wobcke, Wayne - A BDI Agent Architecture for Dialogue Modelling and Coordination in a Smart Personal Assistant, in Volume 57;
  • Wohed, Petia - On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling, in Volume 53;
  • Wojnar, Maciej - HOPPER: a hierarchical planning agent for unpredictable domains, in Volume 91;
  • Wolf, Christian - iWeaver: Towards 'Learning Style'-based e-Learning in Computer Science Education, in Volume 20;
  • Wolff, Rodney - News Aware Volatility Forecasting: Is the Content of News Important?, in Volume 70; - What Types of Events Provide the Strongest Evidence that the Stock Market is Affected by Company Specific News?, in Volume 61;
  • Wollowski, Michael - Evolution of an International Collaborative Student Project, in Volume 95;
  • Won, Hong-Hee - Machine Learning in DNA Microarray Analysis for Cancer Classification, in Volume 19;
  • Wong, Allan K. Y. - A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively, in Volume 38;
  • Wong, Felix - CONFER: Towards Groupware for Building Consensus in Collaborative Software Engineering, in Volume 64;
  • Wong, Kee Yew - Support Vector Machine Approach for Cancer Detection Using Amplified Fragment Length Polymorphism (AFLP) Screening Method, in Volume 29;
  • Wong, Kenneth - Algebraic Analysis of LEX, in Volume 98;
  • Wong, Kenneth Koon-Ho - Faster Group Operations on Elliptic Curves, in Volume 98;
  • Wong, Koon-Pong - Functional Segmentation of Dynamic Emission Tomographic images, in Volume 2; - Non-Invasive estimation of Cerebral Metabolic Rate of Glucose Using Simultaneous Estimation and Cluster Analysis: A feasibility Study, in Volume 2; - Numerical Deconvolution by a Monte Carlo Approach with Application to Dynamic Cardiac Perfusion Tc-99m SPECT, in Volume 11;
  • Wong, Limsoon - From Informatics to Bioinformatics, in Volume 19; - Use of Built-in Features in the Interpretation of High-dimensional Cancer Diagnosis Data, in Volume 29;
  • Wong, Prudence W.H. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
  • Wong, Raymond - Shallow NLP techniques for Internet Search, in Volume 48;
  • Wong, Raymond K. - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19; - Cooperative Query Answering for Semistructured Data, in Volume 17; - Currency Exchange Rate Forecasting From News Headlines, in Volume 5; - Dynamic Labeling Schemes for Ordered XML Based on Type Information, in Volume 49; - Efficient XQuery Join Processing in Publish/Subscribe Systems, in Volume 92; - Informative 3D Visualization of Multiple Protein Structures, in Volume 29; - Mobile Information Exchange and Integration: From Query to Application Layer, in Volume 92; - Optimizing The Lazy DFA Approach for XML Stream Processing, in Volume 27; - Optimizing XPath Queries on Streaming XML Data, in Volume 63; - Querying and Maintaining Ordered XML Data using Relational Databases, in Volume 39;
  • Wong, W.F. - Sensitivity Analysis of a Superscalar Processor Model, in Volume 6;
  • Wong, Wilson - Determining Termhood for Learning Domain Ontologies in a Probabilistic Framework, in Volume 70; - Determining Termhood for Learning Domain Ontologies using Domain Prevalence and Tendency, in Volume 70; - Integrated Scoring For Spelling Error Correction, Abbreviation Expansion and Case Restoration in Dirty Text, in Volume 61; - Measuring Data-Driven Ontology Changes using Text Mining, in Volume 70;
  • Wongthongtham, Pornpit - Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling, in Volume 79;
  • Woo, Chaw-Seng - Performance Factors Analysis of a Wavelet-based Watermarking Method, in Volume 44; - Recovery of Watermark Using Differential Affine Motion Estimation, in Volume 44;
  • Woo, Jehak - Alias Analysis for Exceptions in Java, in Volume 4;
  • Woo, Jongwook - Alias Analysis for Exceptions in Java, in Volume 4;
  • Woodcock, R. - Service Oriented Grid Architecture for Geosciences Community, in Volume 68;
  • Woodford, Brendon J. - A Wavelet-Based Neuro-Fuzzy System for Data Mining Small Image Sets, in Volume 32;
  • Woodford, Karyn - Multiple Choice Questions Not Considered Harmful, in Volume 42;
  • Woodward, Charles - Augmented Interiors with Digital Camera Images, in Volume 50;
  • Wright, David A. - Adaptive Cooperative Fuzzy Logic Controller, in Volume 26;
  • Wright, Fred A. - Mega Weaver: A Simple Iterative Approach for BAC Consensus Assembly, in Volume 29;
  • Wright, Jevon - Survey of Existing Languages to Model Interactive Web Applications, in Volume 79;
  • Wright, June L. - The Role of the Teacher in Scaffolding Children's Interactions in a Technological Environment: How a Technology Project is Transforming Preschool Teacher Practices in Urban Schools, in Volume 34;
  • Wright, Tim - Evaluation of Two Textual Programming Notations for Children, in Volume 40; - Moving animation script creation from textual to visual representation, in Volume 50; - PatternProgrammer: Yet Another Rule-Based Programming Environment for Children, in Volume 50; - Usability Evaluation of Library Online Catalogues, in Volume 50; - Using a System of Tutorials and Groups to Teach User Interface Design, in Volume 42; - Visualisations of Execution Traces (VET): An Interactive Plugin-Based Visualisation Tool, in Volume 50;
  • Wu, Baolin - Agent-based Ontology Integration for Ontology-based Applications, in Volume 58;
  • Wu, Hong - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
  • Wu, Hongwei - Deriving Relation Keys from XML Keys, in Volume 17;
  • Wu, Mingfang - An Investigation on a Community's Web Search Variability, in Volume 74;
  • Wu, Qiang - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38; - Image Segmentation on Spiral Architecture, in Volume 11;
  • Wu, Shuanhu - Microarray Image Processing Based on Clustering and Morphological Analysis, in Volume 19;
  • Wu, Sue R. - Screen Capture - A Vector Quantisation Approach, in Volume 36;
  • Wu, Xiaoming - A Combined Model and a Varied Gibbs Sampling Algorithm Used for Motif Discovery, in Volume 29;
  • Wu, Xiaoyun - A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters, in Volume 44;
  • Wu, Yingxin - The Geodesic Self-Organizing Map and Its Error Analysis, in Volume 38; - Three Dimensional Colour Pickers, in Volume 45; - Visualizing Multivariate Network on the Surface of a Sphere, in Volume 60;
  • Wu, Yongdong - Counterfeiting Attack on a Lossless Authentication Watermarking Scheme, in Volume 22;
  • Wuensche, Burkhard - A Comparison and Evaluation of Interpolation Methods for Visualising Discrete 2D Survey Data, in Volume 35; - A Framework for InteractiveWeb-Based Visualization, in Volume 50; - A Survey, Classification and Analysis of Perceptual Concepts and their Application for the Effective Visualisation of Complex Information, in Volume 35; - Advanced Texturing Techniques for the Effective Visualization of Neoroanatomy from Diffusion Tensor Imaging Data, in Volume 29; - The Visualization and Measurement of Left Ventricular Deformation, in Volume 19;
  • Wuensche, Burkhard C. - Game/Music Interaction - An Aural Interface for Immersive Interactive Environments, in Volume 64;
  • Wyatt, Mathew J. - YourSRB: A cross platform interface for SRB and Digital Libraries, in Volume 68;
  • Wynn, M. T. - Product Flow Analysis in Distribution Networks with a Fixed Time Horizon, in Volume 74;
  • Wynn, Moe Thandar - Synthesis of Orchestrators from Service Choreographies, in Volume 96;
Top of List

X

  • Xiao, Haili - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
  • Xiao, Jianchang - Deriving Relation Keys from XML Keys, in Volume 17;
  • Xiao, Yi - Facial Feature Location with Delaunay Triangulation/Voronoi Diagram Calculation, in Volume 11;
  • Xie, Huayang - Detecting Stress in Spoken English using Decision Trees and Support Vector Machines, in Volume 32; - Learning Models for English Speech Recognition, in Volume 26;
  • Xie, Zhipeng - LBR-Meta: An Efficient Algorithm for Lazy Bayesian Rules, in Volume 87;
  • Xin, Jing - Relevance Feedback for Content-Based Image Retrieval Using Bayesian Network, in Volume 36;
  • Xiong, Chaoyue - Modelling and Simulation of Routing Protocol for Mobile Ad Hoc Networks Using Coloured Petri Nets, in Volume 12;
  • Xu, Changsheng - Counterfeiting Attack on a Lossless Authentication Watermarking Scheme, in Volume 22; - Image Mosaics Based on Homogenous Coordinates, in Volume 22; - Web-based Image Authentication Using Invisible Fragile Watermark, in Volume 11;
  • Xu, Guandong - Breast Cancer Survivability via AdaBoost Algorithms, in Volume 80; - Discovering Task-Oriented Usage Pattern for Web Recommendation, in Volume 49; - Discovering User Access Pattern Based on Probabilistic Latent Factor Model, in Volume 39;
  • Xu, Kai - Database Support For Multiresolution Terrain Visualization, in Volume 17; - Visual Analysis of Network Centralities, in Volume 60;
  • Xu, Lin - Approximate Retrieval of XML Data with ApproXPath, in Volume 75;
  • Xu, Richard Y. D. - Media Streaming Synchronisation and Video Interaction : A Survey, in Volume 22; - Object Tracking Using CamShift Algorithm and Multiple Quantized Feature Spaces, in Volume 36; - Robust Real-Time Tracking of Non-Rigid Objects, in Volume 36;
  • Xu, Shengjin - A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68;
  • Xu, Yinfeng - On-demand Bounded Broadcast Scheduling with Tight Deadlines, in Volume 51;
  • Xu, Ying - Exact Pattern Matching for RNA Secondary Structures, in Volume 29;
  • Xu, Yong - Wearable Microphone Array as User Interface, in Volume 28;
  • Xu, Yue - Data Mining For Lifetime Prediction of Metallic Components, in Volume 61;
  • Xuan, Thanh Quach - Simple Eight Bit, Emulated Computers for Illustrating Computer Architecture Concepts and Providing a Starting Point for Student Designs, in Volume 66;
  • Xue, Jingling - Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading, in Volume 38; - Strength Reduction for Loop-Invariant Types, in Volume 26;
  • Xue, Liyin - A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors, in Volume 16;
Top of List

Y

  • Yacef, Kalina - Making Large Class Teaching More Adaptive With the Logic-ITA, in Volume 30;
  • Yamaguchi, Kazuaki - Improvements of TLAESA Nearest Neighbour Search Algorithm and Extension to Approximation Search, in Volume 48;
  • Yamakami, Tomoyuki - Quantum List Decoding from Quantumly Corrupted Codewords for Classical Block Codes of Polynomially Small Rate, in Volume 65;
  • Yamamoto, Kazuma - Using Attributed Goal Graphs for Software Component Selection: An Application of Goal-Oriented Analysis to Decision Making, in Volume 83;
  • Yamashita, Fumiyoshi - Visualization of multi-dimensional data of bioactive chemicals using a hierarchical data visualization technique 'HeiankyoView', in Volume 60;
  • Yan, Hong - A Fuzzy Rule-Based Interactive Methodology for Training Multimedia Actors, in Volume 2; - A Hierarchical Approach in Multilevel Thresholding Based on Maximum Entropy and Bayes' Formula, in Volume 11; - An Effective Multilevel Thresholding Approach Using Conditional Probability Entropy and Genetic Algorithm, in Volume 22; - Comparison of Five Conditional Probabilities in 2-Level Image Threshold Based on Bayesian Formulation, in Volume 2; - Facial Feature Location with Delaunay Triangulation/Voronoi Diagram Calculation, in Volume 11; - Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges, in Volume 11; - Gene Expression Data Clustering and Visualization Based on a Binary Heirarchical Clustering Framework, in Volume 19; - Hidden Line Removal for 2D Cartoon Images, in Volume 11; - Line Extraction Using Image Carving, in Volume 22; - Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29; - Microarray Image Processing Based on Clustering and Morphological Analysis, in Volume 19; - Newspaper Document Analysis Featuring Connected Line Segmentation, in Volume 11; - Quantification of Neural Images using Grey Difference, in Volume 73; - Reduction of Artifacts in Cosine Transform Coded Images, in Volume 11; - Region Matching by Optimal Fuzzy Dissimilarity, in Volume 2; - Vectorization of Cartoon Drawings, in Volume 2;
  • Yan, Xin - Document Generality: its Computation for Ranking, in Volume 49;
  • Yan, Yanxin - Wearable Microphone Array as User Interface, in Volume 28;
  • Yang, Biao - An environment for developing adaptive, multi-device user interfaces, in Volume 18;
  • Yang, Chi - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75; - Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75;
  • Yang, Dongqiang - Automatic Thesaurus Construction, in Volume 74; - Measuring Semantic Similarity in the Taxonomy of WordNet, in Volume 38;
  • Yang, Doris Dongsheng - How does internationalisation affect learning and teaching of computer science: a study at Tongji University in China, in Volume 88;
  • Yang, Hong Yul - A Solar System Metaphor for 3D Visualisation of Object Oriented Software Metrics, in Volume 35;
  • Yang, Jeongmo - Secure Key Issuing in ID-based Cryptography, in Volume 32;
  • Yang, Jian - What is Required in Business Collaboration?, in Volume 92;
  • Yang, Jingyi - EMAGEN: An Efficient Approach to Multiple Whole Genome Alignment, in Volume 29;
  • Yang, Michael - Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
  • Yang, Mingjiang - Wearable Microphone Array as User Interface, in Volume 28;
  • Yang, Yun - A Min-Min Average Algorithm for Scheduling Transaction-Intensive Grid Workflows, in Volume 99; - Agent-based Ontology Integration for Ontology-based Applications, in Volume 58; - Extended Radar View and Modification Director: Awareness Mechanisms for Synchronous Collaborative Authoring, in Volume 50; - Incorporating blogs, social bookmarks, and podcasts into unit teaching, in Volume 78; - Key Research Issues in Grid Workflow Verification and Validation, in Volume 54; - Supporting Virtual Organisation Alliances with Relative Workflows, in Volume 53; - SWIM: An Alternative Interface for MSN Messenger, in Volume 64;
  • Yao, Andrew - The Development of a Video Metadata Authoring and Browsing System in XML, in Volume 2;
  • Yao, Daming - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
  • Yau, Wai C. - Vowel recognition of English and German language using Facial movement(SEMG) for Speech control based HCI, in Volume 56;
  • Yau, Wai Chee - Voiceless Speech Recognition Using Dynamic Visual Speech Features, in Volume 56;
  • Ye, Fan - Contract-Based Justification for COTS Component within Safety Critical Applications, in Volume 47;
  • Yearwood, John - A Semantic Approach to Boost Passage Retrieval Effectiveness for Question Answering, in Volume 48; - An Interactive Knowledge-based Learning Environment for Transferring Health Knowledge, in Volume 68; - Applying Anatomical Therapeutic Chemical (ATC) and Critical Term Ontologies to Australian Drug Safety Data for Association Rules and Adverse Event Signalling, in Volume 58; - Classification for accuracy and insight: A weighted sum approach, in Volume 70; - Using Corpus Analysis to Inform Research into Opinion Detection in Blogs, in Volume 70;
  • Yearwood, John L. - A Classification Algorithm that Derives Weighted Sum Scores for Insight into Disease, in Volume 97; - Opinion Search in Web Logs, in Volume 63;
  • Yeh, Chung-Hsing - Discovering Parallel Text from The World Wide Web, in Volume 32;
  • Yeh, Ping-Jer - Tracking the Changes of Dynamic Web Pages in the Existence of URL Rewriting, in Volume 61;
  • Yen, Hsu-Chun - Mental Map Preserving Graph Drawing Using Simulated Annealing, in Volume 60;
  • Yerraballi, Ramesh - A High Performance Kernel-Less Operating System Architecture, in Volume 38; - SPiKE: Engineering Malware Analysis Tools using Unobtrusive Binary-Instrumentation, in Volume 48;
  • Yeung, Lap Kun - Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
  • Yim, Dennis - Systems Assurance for the Integrated Control and Communications System for KCRC East Rail Extensions, in Volume 15;
  • Ying, Cheung Man - Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries, in Volume 63;
  • Yip, Ben - 3D Reconstruction of a Human Face with Monocular Camera Based on Head Movement, in Volume 36; - Visualising Internet Traffic Data with Three-Dimensional Spherical Display, in Volume 45;
  • Yiu, S.M. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
  • Yokoyama, Shohei - An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories, in Volume 39;
  • Yong, Xia - Optimal Selection of Image Segmentation Algorithms Based on Performance Prediction, in Volume 36;
  • Yoo, Hee Yong - Visualization by information type on mobile device, in Volume 60;
  • Yoo, Illhoi - Classification Comparison of Prediction of Solvent Accessibility From Protein Sequences, in Volume 29; - Cluster Ensemble and Its Applications in Gene Expression Analysis, in Volume 29;
  • Yoo, Seungjae - Secure Key Issuing in ID-based Cryptography, in Volume 32;
  • Yoshida, Yusuke - Performance Evaluation of Combining Data Migration and Method Migration in Object Database Environments, in Volume 5;
  • Yoshikawa, Masatoshi - A Path-based Relational RDF Database, in Volume 39;
  • Yost, Nancy - Computers, Kids, and Crayons: A Comparative Study of Emergent Writing Behaviours, in Volume 34; - Look What Kindergarten Children Can Do with Technologies!, in Volume 34;
  • Youcef-Toumi, Kamal - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
  • Young, Alison - Facilitating Global Computing Education Through Study Abroad and Collaborative Projects, in Volume 52; - Multi-Institutional Teaching Communities in Computer Education, in Volume 52;
  • Young, Alison L. - Developing and Implementing a Professional Doctorate in Computing, in Volume 30; - Teaching ICT to Pacific Island Background Students, in Volume 30;
  • Young, Stuart - Facilitating Successful Online Computing Courses While Minimising Extra Tutor Workload, in Volume 30;
  • Yu, Byung-Hyun - Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory, in Volume 26;
  • Yu, Donggang - Quantification of Neural Images using Grey Difference, in Volume 73;
  • Yu, Ge - M+-tree : A New Dynamical Multidimensional Index for Metric Spaces, in Volume 17;
  • Yu, Jeffrey Xu - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75; - M+-tree : A New Dynamical Multidimensional Index for Metric Spaces, in Volume 17; - Path Materialization Revisited: An Efficient Storage Model for XML Data, in Volume 5; - Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75;
  • Yu, Larry T.H. - Using Emerging Pattern Based Projected Clustering and Gene Expression Data for Cancer Detection, in Volume 29;
  • Yu, Man Hing - Shape Similarity Search Using XML and Portal Technology, in Volume 36; - Web-based Multimedia GP Medical System, in Volume 36;
  • Yu, Shui - Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
  • Yu, Xiaomei - A Simulation Study of Using ER Feedback Control to Transport Compressed Video over ATM Networks, in Volume 2; - A Telemedicine System over Internet, in Volume 2;
  • Yu, Zu-Guo - Phylogenetic Tree of Prokaryotes Based on the Complete Genomes using Fractal and Correlation Analyses, in Volume 29;
  • Yuan, Bo - Mega Weaver: A Simple Iterative Approach for BAC Consensus Assembly, in Volume 29;
  • Yuan, M.L. - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
  • Yuan, Shyan-Ming - Tracking the Changes of Dynamic Web Pages in the Existence of URL Rewriting, in Volume 61;
  • Yuan, Yidong - Multi-resolution Algorithms for Building Spatial Histograms, in Volume 17;
  • Yuan, Zhiguo - Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models, in Volume 16;
  • Yura, Kei - Toward Building Grid Applications in Bioinformatics, in Volume 54;
Top of List

Z

  • Zachariasen, M. - Some Structural and Geometric Properties of Two-Connected Steiner Networks, in Volume 65;
  • Zaheer, Raja Asad - Intelligent Cache Management for Data Grid, in Volume 44;
  • Zaiane, Osmar R. - Classifying Text Documents by Associating Terms With Text Categories, in Volume 5; - Foundations for an Access Control Model for Privacy Preservation in Multi-Relational Association Rule Mining, in Volume 14; - Privacy Preserving Frequent Itemset Mining, in Volume 14;
  • Zakaria, Lailatulqadri - Extracting and Modeling the Semantic Information Content of Web Documents to Support Semantic Document Retrieval, in Volume 96;
  • Zarnegar, Armita - Inference of Gene Expression Networks Using Memetic Gene Expression Programming, in Volume 91;
  • Zaslavsky, Arkady - A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios, in Volume 32; - Cost-Efficient Mining Techniques for Data Streams, in Volume 32; - Signature Extraction for Overlap Detection in Documents, in Volume 4; - Suffix Vector: Space- and Time-Efficient Alternative to Suffix Trees, in Volume 4;
  • Zatorsky, Michael - Clustering and Classification of Maintenance Logs using Text Data Mining, in Volume 87;
  • Zeephongsekul, Panlop - The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed Workloads, in Volume 91;
  • Zeng, Zhanggui - Hidden Line Removal for 2D Cartoon Images, in Volume 11; - Line Extraction Using Image Carving, in Volume 22; - Region Matching by Optimal Fuzzy Dissimilarity, in Volume 2;
  • Zenmyo, Kouhei - Graph Orientation Algorithms to Minimize the Maximum Outdegree, in Volume 51;
  • Zhan, Zhijun - Building Decision Tree Classifier on Private Data, in Volume 14;
  • Zhang, Chengqi - Discovering Debtor Patterns of Centrelink Customers, in Volume 61; - The Fish-eye Visualization of Foreign Currency Exchange Data Streams, in Volume 45;
  • Zhang, Debbie - Weighted Kernel Model For Text Categorization, in Volume 61;
  • Zhang, Dianqing - A Confidence Based Recognition System for TV Commercial Extraction, in Volume 75;
  • Zhang, G. - Rule Sets Based Bilevel Decision Model, in Volume 48;
  • Zhang, Hao Lan - Newly-discovered Group Awareness Mechanisms for Supporting Real-time Collaborative Authoring, in Volume 40;
  • Zhang, Honghai - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
  • Zhang, Jianhua - Visualisation and Comparison of Image Collections based on Self-organised Maps, in Volume 32;
  • Zhang, Kang - A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors, in Volume 16; - Compiled Visual Programs by VisPro, in Volume 36; - Using Graph Grammer to Implement Global Layout for a Visual Programming Language Generation System, in Volume 11; - Visual Language Semantics Specification in the VisPro System, in Volume 22;
  • Zhang, Ke -Bing - Compiled Visual Programs by VisPro, in Volume 36;
  • Zhang, Ke-Bing - Using Graph Grammer to Implement Global Layout for a Visual Programming Language Generation System, in Volume 11; - Visual Language Semantics Specification in the VisPro System, in Volume 22;
  • Zhang, Lei - Weighted Kernel Model For Text Categorization, in Volume 61;
  • Zhang, Lin - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12; - Modelling and Initial Analysis of Operational Planning Processes using Coloured Petri Nets, in Volume 12;
  • Zhang, Mengjie - Applying Online Gradient-Descent Search to Genetic Programming for Object Recognition, in Volume 32; - Detecting Stress in Spoken English using Decision Trees and Support Vector Machines, in Volume 32; - Learning Models for English Speech Recognition, in Volume 26;
  • Zhang, Minjie - An Agent-based Peer-to-Peer Grid Computing Architecture - Convergence of Grid and Peer-to-Peer Computing, in Volume 54;
  • Zhang, Qing - Clustering Moving Objects for Spatio-temporal Selectivity Estimation, in Volume 27;
  • Zhang, Qinzhi - Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges, in Volume 11;
  • Zhang, Xiuzhen - Building a Disordered Protein Database: A Case Study in Managing Biological Data, in Volume 63; - Efficiently Computing the Top N Averages in Iceberg Cubes, in Volume 16;
  • Zhang, Xuizhen - Drill Across and Visualization of Cubes with Non-conformed Dimensions, in Volume 75;
  • Zhang, Yan - Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf, in Volume 16;
  • Zhang, Yanchan - Breast Cancer Survivability via AdaBoost Algorithms, in Volume 80;
  • Zhang, Yanchuan - Ticket-Based Service Access Scheme for Mobile Users, in Volume 4;
  • Zhang, Yanchun - A Flexible Payment Scheme and its Permission-Role Assignment, in Volume 16; - A Two-Phase Rule Generation and Optimization Approach for Wrapper Generation, in Volume 49; - An Integrated Access Control for Securely Querying and Updating XML Data, in Volume 75; - Anonymous Access Scheme for Electronic Services, in Volume 26; - Architecture of a Web Accelerator For Wireless Networks, in Volume 62; - Authorization Algorithms for the Mobility of User-Role Relationship, in Volume 38; - Constructing Good Quality Web Page Communities, in Volume 5; - Discovering Task-Oriented Usage Pattern for Web Recommendation, in Volume 49; - Discovering User Access Pattern Based on Probabilistic Latent Factor Model, in Volume 39; - Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations, in Volume 17; - LSDX: A New Labelling Scheme for Dynamically Updating XML Data, in Volume 39; - On Conceptual Modelling and Design of Role-Based Access Control Systems, in Volume 31; - Utilizing Hyperlink Transitivity to Improve Web Page Clustering, in Volume 17; - Web Service Composition Transaction Management, in Volume 27; - Web Service Composition with Case-Based Reasoning, in Volume 17; - Web Services Discovery Based On Schema Matching, in Volume 62;
  • Zhang, Yitao - Extracting Semantics in a Clinical Scenario, in Volume 68;
  • Zhang, Yu - Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
  • Zhao Yang Dong - Determining the Fitness of a Document Model by Using Conflict Instances, in Volume 39;
  • Zhao, Dejin - Generating mobile device user interfaces for diagram-based modelling tools, in Volume 50;
  • Zhao, Jane - Balancing Redundancy and Query Costs in Distributed Data Warehouses, in Volume 43; - Dynamic Data Warehouse Design as a Refinement in ASM-based Approach, in Volume 67; - Using Abstract State Machines for Distributed Data Warehouse Design, in Volume 31;
  • Zhao, Liping - Symmetry in Class and Type Hierarchy, in Volume 10;
  • Zhao, Mansuo - Comparison of Five Conditional Probabilities in 2-Level Image Threshold Based on Bayesian Formulation, in Volume 2;
  • Zhao, Weiliang - A Secure Mental Poker Protocol over the Internet, in Volume 21;
  • Zhao, Xiaohui - Supporting Virtual Organisation Alliances with Relative Workflows, in Volume 53;
  • Zhao, Yanchang - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
  • Zhao, Ying - Searching With Style: Authorship Attribution in Classic Literature, in Volume 62; - Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
  • Zheng, Feifeng - On-demand Bounded Broadcast Scheduling with Tight Deadlines, in Volume 51;
  • Zheng, Lanbo - Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters, in Volume 45;
  • Zheng, Lei - Improving SAT Using 2SAT, in Volume 4;
  • Zheng, Lihong - Edge Detection Based on Modified BP Algorithm of ANN, in Volume 36;
  • Zheng, Tan - 3D Reconstruction of Single Picture, in Volume 36;
  • Zheng, Z. - Rule Sets Based Bilevel Decision Model, in Volume 48;
  • Zhong, David - Color Space Analysis in Color Image Segmentation, in Volume 2;
  • Zhou, Aoying - Deriving Relation Keys from XML Keys, in Volume 17;
  • Zhou, Guyin - Line Drawing in Virtual Reality using a Game Pad, in Volume 50;
  • Zhou, Huan-Xiang - Classification Comparison of Prediction of Solvent Accessibility From Protein Sequences, in Volume 29;
  • Zhou, Jun - Multi-Scale Edge Detection with Bilateral Filtering in Spiral Architecture, in Volume 36;
  • Zhou, Junmei - Deriving Relation Keys from XML Keys, in Volume 17;
  • Zhou, QingQing - A Market-based Rule Learning System, in Volume 32;
  • Zhou, Tina T. - Principles of Video Annotation Markup Language (VAML), in Volume 36;
  • Zhou, Wanlei - Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
  • Zhou, Xiangmin - A Confidence Based Recognition System for TV Commercial Extraction, in Volume 75; - Efficient Similarity Search by Summarization in Large Video Database, in Volume 63; - M+-tree : A New Dynamical Multidimensional Index for Metric Spaces, in Volume 17;
  • Zhou, Xiaobo - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
  • Zhou, Xiaofang - Dimensionality Reduction in Patch-Signature Based Protein Structure Matching, in Volume 49; - Discovering Task-Oriented Usage Pattern for Web Recommendation, in Volume 49; - Discovering User Access Pattern Based on Probabilistic Latent Factor Model, in Volume 39; - Efficient Similarity Search by Summarization in Large Video Database, in Volume 63; - Multiresolution Amalgamation: Dynamic Spatial Data Cube Generation, in Volume 27; - Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
  • Zhu, Jihan - Successful Studio-based Real-World Projects in IT Education, in Volume 20;
  • Zhu, Nianping - Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
  • Zhu, Y. - Sensitivity Analysis of a Superscalar Processor Model, in Volume 6;
  • Zhu, Zexuan - Whole-Genome Functional Classification of Genes by Latent Semantic Analysis on Microarray Data, in Volume 29;
  • Zic, John - On Modelling Real-Time Mobile Processes, in Volume 4;
  • Zimanyi, Esteban - A Conceptual Solution for Representing Time in Data Warehouse Dimensions, in Volume 53;
  • Zimmermann, Jacob - Distributed intrusion detection in clusters based on non-interference, in Volume 54;
  • Zirintsis, Evangelos - Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
  • Zito, Michele - Large k-Separated Matchings of Random Regular Graphs, in Volume 38;
  • Zlatkin, Sergiy - An e-Process Selection Model, in Volume 83;
  • Zobel, Justin - An Investigation on a Community's Web Search Variability, in Volume 74; - Distributed Text Retrieval From Overlapping Collections, in Volume 63; - Efficient Trie-Based Sorting of Large Sets of Strings, in Volume 16; - In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems, in Volume 26; - Music Ranking Techniques Evaluated, in Volume 4; - Performance of Data Structures for Small Sets of Strings, in Volume 4; - Questioning Query Expansion: An Examination of Behaviour and Parameters, in Volume 27; - Searching With Style: Authorship Attribution in Classic Literature, in Volume 62; - Uni Cheats Racket: A Case Study in Plagiarism Investigation, in Volume 30; - Video Similarity Detection for Digital Rights Management, in Volume 16; - What Drives Curriculum Change?, in Volume 30;
  • Zou, Joe - Non-Functional Requirements in Business Process Modeling, in Volume 79;
  • Zou, Ju Jia - Reduction of Artifacts in Cosine Transform Coded Images, in Volume 11; - Vectorization of Cartoon Drawings, in Volume 2;
  • Zschorn, Andrew - Speech-to-Text Transcription in Support of Pervasive Computing, in Volume 25;
  • zur Muehlen, Michael - Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis, in Volume 83;
Top of List