|
| | | |
Published Papers by Author
Listed below are all authors published in the conference series so far. Next to each name is the volume number(s) in which their paper(s) appear.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Top of List A - Aa, Tom Vander - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
- Aalst, Wil M.P. van der - When are two Workflows the Same?, in Volume 41;
- Abawajy, Jemal H. - Communication Network Analysis of the Enterprise Grid Systems, in Volume 68;
- Abbass, Hussein A. - A Comparative Study for Domain Ontology Guided Feature Extraction, in Volume 16;
- Abd Rozan, Mohd Zaidi - Multilingual ICT Education: Language Observatory as a Monitoring Instrument, in Volume 46;
- Abdul Kareem, Sameem - An ontology-based approach for resolving semantic schema conflicts in the extraction and integration of query-based information from heterogeneous web data sources, in Volume 85;
- Abdullah, Ahsan - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
- Abraham, Tamas - Event Sequence Mining to Develop Profiles for Computer Forensic Investigation Purposes, in Volume 54;
- Abramson, David - Optimizing Tunneled Grid Connectivity across Firewalls, in Volume 99;
- Abu Bakar, Ahmad Zaki - Multilingual ICT Education: Language Observatory as a Monitoring Instrument, in Volume 46;
- Achuthan, N. R. - A Bottom-Up Projection Based Algorithm for Mining High Utility Itemsets, in Volume 84;
- Acquaah-Gaisie, Gerald - Economic development via the Net in Oceania, in Volume 1;
- Adams, Brett - Indoor Location Prediction Using Multiple Wireless Received Signal Strengths, in Volume 87;
- Adams, Michael - Developing Case Studies to Enhance Student Learning, in Volume 42;
- Adams, Peter - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
- Adcock, Matt - AreWeThereYet? - A Temporally Aware Media Player, in Volume 76;
- Addie, Ron - A Framework for Role-based group delegation in distributed environment, in Volume 48;
- Peer-to-Peer Form Based Web Information Systems, in Volume 49;
- Ager, Rachel - Getting it Right From the Start: A Case Study of the Development of a Foundation Stage Learning and ICT Strategy in Northamptonshire, UK, in Volume 34;
- Ahmad, Mohammad Nazir - Managing Ontologies: A Comparative Study of Ontology Servers, in Volume 63;
- Ahmad, Muhammad - Modeling Proliferation of Ideas in Online Social Networks, in Volume 61;
- Ahmed, Adel - Automatic Camera Path Generation for Graph Navigation in 3D, in Volume 45;
- Ahmed, Chowdhury Farhan - ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns, in Volume 87;
- Ahmed, Mobin Uddin - Intelligent Cache Management for Data Grid, in Volume 44;
- Ahn, Hee-Kap - Constructing Optimal Highways, in Volume 65;
- Ahoniemi, Tuukka - Effectiveness of integrating program visualizations to a programming course, in Volume 88;
- Fighting the student dropout rate with an incremental programming assignment, in Volume 88;
- Why should we bore students when teaching CS?, in Volume 88;
- Ahsan, Nasir - Learning Causal Networks from Microarray Data, in Volume 73;
- Akand, Elma - Learning from Ontological Annotation : an Application of Formal Concept Analysis to Feature Construction in the Gene Ontology, in Volume 85;
- Akbari, Mohammad K. - Communication Network Analysis of the Enterprise Grid Systems, in Volume 68;
- Akiyama, Toyokazu - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
- Akoka, Jacky - Perceived vs. Measured Quality of Conceptual Schemas: An Experimental Comparison, in Volume 83;
- Aksoy, Hakan - Mining for offender group detection and story of a police operation, in Volume 70;
- Akutsu, Tatsuya - Protein Side-chain Packing Problem: A Maximum Edge-weight Clique Algorithmic Approach, in Volume 29;
- Al Zomai, Muhammed - Usability and Privacy in Identity Management Architectures, in Volume 68;
- Al-Fedaghi, Sabah S. - Beyond Purpose-Based Privacy Access Control, in Volume 63;
- Al-Mahmood, Reem - Strategies for Communication Skills Development, in Volume 30;
- Al-Oqaily, Ahmad - Comparison of Visualization Methods of Genome-wide SNP Profiles in Childhood Acute Lymphoblastic Leukaemia, in Volume 87;
- Using a Kernel-Based Approach to Visualize Integrated Chronic Fatigue Syndrome Datasets, in Volume 61;
- Al-Saggaf, Yeslam - Introduction - Computers and Philosophy, in Volume 37;
- Al-Wasil, Fahad M. - Establishing an XML Metadata Knowledge Base to Assist Integration of Structured and Semi-structured Databases, in Volume 49;
- Alachaher, Leila Nemmiche - Visualization of Attractive and Repulsive Zones Between Variables, in Volume 61;
- Albertyn, Frina - An e-Process Selection Model, in Volume 83;
- Alcalde, Baptiste - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
- Alfayyadh, Bander - An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems, in Volume 81;
- Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign, in Volume 81;
- Algur, Siddu P. - Extraction of Flat and Nested Data Records from Web Pages, in Volume 61;
- Alhadi, Arifah Che - Extracting and Modeling the Semantic Information Content of Web Documents to Support Semantic Document Retrieval, in Volume 96;
- Aljasser, Khalid - ParaAJ: toward Reusable and Maintainable Aspect Oriented Programs, in Volume 91;
- Allan, Jeff - UK e-Science Pilot Project DAME: Context, Lessons Learned and Future, in Volume 44;
- Allen, John G. - Code Generation for Just-in-Time Compiled Mobile Collector Agents, in Volume 22;
- Enhancing Screen Teleconferencing with Streaming SIMD Extensions, in Volume 11;
- Object Tracking Using CamShift Algorithm and Multiple Quantized Feature Spaces, in Volume 36;
- Robust Real-Time Tracking of Non-Rigid Objects, in Volume 36;
- Allender, Eric - Chipping Away at P vs NP: How Far Are We from Proving Circuit Size Lower Bounds?, in Volume 77;
- Allert, James D. - The Effectiveness of Innovative Approaches to CS1: Comparing Opinion to Outcome, in Volume 26;
- Allison, Lloyd - A Programming Paradigm for Machine Learning, with a Case Study of Bayesian Networks, in Volume 48;
- Types and Classes of Machine Learning and Data Mining, in Volume 16;
- Allsman, Roberta - Integrating The MACHO Data-set with the Virtual Observatory, in Volume 44;
- Allwright, Alan - Exploratory Mining over Organisational Communications Data, in Volume 87;
- Alt, Helmut - Constructing Optimal Highways, in Volume 65;
- Altenbernd, Peter - Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices, in Volume 26;
- Altenkirch, Thorsten - Constructing Strictly Positive Families, in Volume 65;
- Altman, Tom - Structure-Based Document Model with Discrete Wavelet Transforms and Its Application to Document Classification, in Volume 87;
- Altmann, Josef - A Component-Based Application Framework for Manufacturing Execution Systems in C# and .NET, in Volume 10;
- Altmanninger, Kerstin - Towards Accurate Conflict Detection in a VCS for Model Artifacts: A Comparison of Two Semantically Enhanced Approaches, in Volume 96;
- Alvares, Luis Otavio - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83;
- Alzaid, Hani - Secure Data Aggregation in Wireless Sensor Network: a survey, in Volume 81;
- AlZomai, Mohammed - An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems, in Volume 81;
- AlZoubi, Omar - Classification of Brain-Computer Interface Data, in Volume 87;
- Amagasa, Toshiyuki - A Path-based Relational RDF Database, in Volume 39;
- Amann, Philipp - Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing, in Volume 21;
- Amaral, Fernando N. - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
- Ambikairajah, Eliathamby - Visualisation of Reduced-Dimension Microarray Data Using Gaussian Mixture Models, in Volume 45;
- Ambroise, C. - On the Simultaneous Use of Clinical and Microarray Expression Data in the Cluster Analysis of Tissue Samples, in Volume 29;
- Amer, Taher - Evaluating Swiftpoint as a Mobile Device for Direct Manipulation Input, in Volume 64;
- Amirbekyan, Artak - A New Efficient Privacy-Preserving Scalar Product Protocol, in Volume 70;
- The Privacy of k-NN Retrieval for Horizontal Partitioned Data - New Methods and Applications, in Volume 63;
- Ammerlaan, Justin - Adaptive Cooperative Fuzzy Logic Controller, in Volume 26;
- An, Jiyuan - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
- Analoui, M. - Grid-JQA : Grid Java based Quality of service management by Active database, in Volume 54;
- Ancona, Massimo - From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
- Anderson, Kevin - A risk-based approach to supporting the operator role in complex monitoring systems, in Volume 86;
- Anderson, Kevin J. - SIL Rating Fire Protection Equipment, in Volume 33;
- Andrade, Marcus Vinicius Alvim - Improving Productivity and Quality of GIS Databases Design using an Analysis Pattern Catalog, in Volume 43;
- Andreae, Peter - Detecting Stress in Spoken English using Decision Trees and Support Vector Machines, in Volume 32;
- HOPPER: a hierarchical planning agent for unpredictable domains, in Volume 91;
- Learning Models for English Speech Recognition, in Volume 26;
- S.E.A.L. - A Query Language for Entity-Association Queries, in Volume 92;
- Ang, Russell - Predictive Model of Insolvency Risk for Australian Corporations, in Volume 70;
- Anh, Vo - Phylogenetic Tree of Prokaryotes Based on the Complete Genomes using Fractal and Correlation Analyses, in Volume 29;
- Anh, Vo Ngoc - Improved Retrieval Effectiveness Through Impact Transformation, in Volume 5;
- Index Compression Using Fixed Binary Codewords, in Volume 27;
- Ankcorn, John - Lightweight User Interfaces for Watch Based Displays, in Volume 40;
- Anslow, Craig - Aspects to Visualising Reusable Components, in Volume 24;
- XML Database Support for Program Trace Visualisation, in Volume 35;
- Antonie, Maria-Luiza - Classifying Text Documents by Associating Terms With Text Categories, in Volume 5;
- Aparicio, Adriana S. - Applying Ontologies in the Integration of Heterogeneous Relational Databases, in Volume 58;
- Apperley, Mark - Computer-Aided Sketching to Capture Preliminary Design, in Volume 7;
- Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
- Arai, Masato - Proposal for Effective Information Flow Control Model for Sharing and Protecting Sensitive Information, in Volume 98;
- Arbelaitz, Olatz - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87;
- Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
- Archer, David W. - Capturing Users' Everyday, Implicit Information Integration Decisions, in Volume 83;
- Ardagh, David - Public Education in Computer Usage: An Ethico-Political Rationale, in Volume 1;
- Aritsugi, Masayoshi - Performance Evaluation of Combining Data Migration and Method Migration in Object Database Environments, in Volume 5;
- Arjunan, Sridhar P. - Vowel recognition of English and German language using Facial movement(SEMG) for Speech control based HCI, in Volume 56;
- Arjunan, Sridhar Poosapadi - Voiceless Speech Recognition Using Dynamic Visual Speech Features, in Volume 56;
- Armstrong, Helen - A Computing Education Vision for the Sight Impaired, in Volume 30;
- Armstrong, Leisa - The application of data mining techniques to characterize agricultural soil profiles, in Volume 70;
- Arnott, David - A Studio-Based Approach to Teaching Information Technology, in Volume 8;
- Arvo, James - Fluid Sketching of Directed Graphs, in Volume 50;
- Arvola, Mattias - Lessons Learned from Facilitation in Collaborative Design, in Volume 64;
- Arwin, Christian - Plagiarism Detection across Programming Languages, in Volume 48;
- Asahiro, Yuichi - Graph Classes and the Complexity of the Graph Orientation Minimizing the Maximum Weighted Outdegree, in Volume 77;
- Graph Orientation Algorithms to Minimize the Maximum Outdegree, in Volume 51;
- Asano, Tetsuo - Computational Geometric and Combinatorial Approaches to Digital Halftoning, in Volume 51;
- Constructing Optimal Highways, in Volume 65;
- Asheibi, Ali - Analyzing Harmonic Monitoring Data Using Data Mining, in Volume 61;
- Asian, Jelita - Stemming Indonesian, in Volume 38;
- Askitis, Nikolas - Fast and Compact Hash Tables for Integer Keys, in Volume 91;
- HAT-Trie: A Cache-Conscious Trie-Based Data Structure For Strings, in Volume 62;
- Asquith, Matthew - An ILP for the metro-line crossing problem, in Volume 77;
- Atallah, Mikhail J. - A Survey of Watermarking Techniques for Non-Media Digital Objects, in Volume 44;
- Remote Revocation of Smart Cards in a Private DRM System, in Volume 44;
- Atchison, Brenton - A Product-Based Assurance Model for Mixed-Integrity Markets, in Volume 15;
- Revision of Australian Defence Standard Def (Aust) 5679, in Volume 55;
- Atkinson, Ian - Supporting Coral Reef Ecosystems Research through Modelling Re-usable Ontologies, in Volume 90;
- Atkinson, Ian M. - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
- The Semantic Reef: Managing Complex Knowledge to Predict Coral Bleaching on the Great Barrier Reef, in Volume 68;
- YourSRB: A cross platform interface for SRB and Digital Libraries, in Volume 68;
- Atkinson, Malcolm - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54;
- Attali, Isabelle - Alias Analysis for Exceptions in Java, in Volume 4;
- Au, Fiora T. W. - Automated Usability Testing Framework, in Volume 76;
- Au, Richard - A Method for Access Authorisation Through Delegation Networks, in Volume 54;
- Ausanka-Crues, Ryan - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
- Ausiello, Giorgio - Greedy algorithms for on-line set-covering and related problems, in Volume 51;
- Avery, Benjamin - Evaluation of User Satisfaction and Learnability for Outdoor Augmented Reality Gaming, in Volume 50;
- Outdoor Augmented Reality Gaming on Five Dollars a Day, in Volume 40;
- Avram, Chris - Differing Ways that Computing Academics Understand Teaching, in Volume 66;
- Performance and progression of first year ICT students, in Volume 78;
- Awang Iskandar, D. N. F. - Content-based Image Retrieval Using Image Regions as Query Examples, in Volume 75;
- Ayed, Samiha - Deploying Access Control in Distributed Workflow, in Volume 81;
- Azok, Joseph - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
Top of ListB - Baader, Franz - A Description Logics Voyage: From Inexpressive to Expressive Languages and Back, in Volume 58;
- Back, Ralph-Johan - Improving mathematics and programming education - the IMPEd initiative, in Volume 88;
- Back, Ralph-Johan - Why Complicate Things? Introducing Programming in High School Using Python, in Volume 52;
- Bae, Sang Won - Constructing Optimal Highways, in Volume 65;
- Baeza-Yates, Ricardo - Web Mining in Search Engines, in Volume 26;
- Bagirov, Adil M. - Modified Global K-Means Algorithm for Clustering in Gene Expression Data Sets, in Volume 73;
- Bahreini, Kiavash - Enterprise Semantic Information Search System Based on New Music and Audio Ontology Integrating Existing Ontologies, in Volume 85;
- Bai, Shi - On the Efficiency of Pollard's Rho Method for Discrete Logarithms, in Volume 77;
- Bai, Xin - Segmentation-Based Multilayer Diagnosis Lossless Medical Image compression, in Volume 36;
- Bailey, James - Are Zero-suppressed Binary Decision Diagrams Good for Mining Frequent Patterns in High Dimensional Datasets?, in Volume 70;
- Merging Dynamic Functionality: Integration of XML Transformations, in Volume 67;
- Static Analysis of XSLT Programs, in Volume 27;
- Transformation and Reaction Rules for Data on the Web, in Volume 39;
- Bain, Christopher A. - Hospital Management Knowledge Discovery using Discrete Event Simulation, in Volume 68;
- Bain, Michael - Learning Causal Networks from Microarray Data, in Volume 73;
- Learning from Ontological Annotation : an Application of Formal Concept Analysis to Feature Construction in the Gene Ontology, in Volume 85;
- Bajic, Vladimir B. - From Informatics to Bioinformatics, in Volume 19;
- Baker, Bob - A New Approach to a First Year Undergraduate Information Systems Course, in Volume 20;
- Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52;
- Predictors of success in a first programming course, in Volume 52;
- The ability to articulate strategy as a predictor of programming skill, in Volume 52;
- Baker, Simon - Automated Usability Testing Framework, in Volume 76;
- Balasubramaniam, Dharini - Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
- Balasubramaniam, Sasitharan - Quality of Service Support for Vertical Handovers in Pervasive Systems, in Volume 25;
- Balbuena, Camino - An open problem: (4; g)-cages with odd g <= 5 are tightly connected, in Volume 65;
- Ballinger, Daniel - Spreadsheet structure inspection using low level access and visualisation, in Volume 18;
- Spreadsheet Visualisation to Improve End-user Understanding, in Volume 24;
- Bancroft, Peter - A Web Based Environment for Learning to Program, in Volume 16;
- Automated Feedback for 'Fill in the Gap' Programming Exercises, in Volume 42;
- Managing Large Class Assessment, in Volume 30;
- Multiple Choice Questions Not Considered Harmful, in Volume 42;
- Program Annotations: Feedback for Students Learning to Program, in Volume 52;
- Static Analysis of Students' Java Programs, in Volume 30;
- Bao, Feng - Counterfeiting Attack on a Lossless Authentication Watermarking Scheme, in Volume 22;
- Barbuto, Leah May - The Role of the Teacher in Scaffolding Children's Interactions in a Technological Environment: How a Technology Project is Transforming Preschool Teacher Practices in Urban Schools, in Volume 34;
- Bard, Gregory V. - Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric, in Volume 68;
- Barg, Michael - Cooperative Query Answering for Semistructured Data, in Volume 17;
- Barker, Ken - Controlling Inference: Avoiding P-level Reduction during Analysis, in Volume 68;
- Barker, Sandra - Online Discussion Boards: Impacting the Learning Experience, in Volume 20;
- Barlow, Michael - A Comparative Study for Domain Ontology Guided Feature Extraction, in Volume 16;
- Barnard, Ross - Let the Shoemaker Make the Shoes - An Abstraction Layer is Needed Between Bioinformatic Analysis, Tools, Data and Equipment : An Agenda for the Next Five Years, in Volume 19;
- Barnes, Alan - Researching Pedagogy and Teaching Methodologies that Transform Student Learning in South Australian Classrooms, in Volume 8;
- Barnes, David G. - A Portal for Grid-enabled Physics, in Volume 44;
- Barnes, Ian - Redesigning the Intermediate Course in Software Design, in Volume 42;
- Barney, David - Calculating Train Braking Distance, in Volume 3;
- Barr, Pippin - A Taxonomic Analysis of User-Interface Metaphors in the Microsoft Office Project Gallery, in Volume 40;
- From Pushing Buttons to Play and Progress: Value and Interaction in Fable, in Volume 50;
- Icons R Icons, in Volume 18;
- Persuasive Interaction for Collectivist Cultures, in Volume 50;
- The Semiotics of User Interface Redesign, in Volume 40;
- Barta, Robert - The Tau Model, Formalizing Topic Maps, in Volume 43;
- Topic Maps: Fundamentalism meets Pragmatism, in Volume 58;
- Bartlett, B. - Dogs or Robots - Why do Children See Them as Robotic Pets Rather Than Canine Machines?, in Volume 28;
- Baskinger, Mark - Visual Narratives: The Essential Role of Imagination in the Visualization Process, in Volume 60;
- Bate, Iain - A Contract-based Approach to Designing Safe Systems, in Volume 33;
- Baturo, Annette R. - Integrating Concrete and Virtual Materials in an Elementary Mathematics Classroom: A Case Study of Success with Fractions, in Volume 8;
- Bauer, Michael J. - Functional Safety of a Theatre Stage Machinery Control System, in Volume 15;
- Baxter, Rohan - Predictive Model of Insolvency Risk for Australian Corporations, in Volume 70;
- Bazilio, Carlos - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
- Bean, R. W. - Clustering Replicated Microarray Data via Mixtures of Random Effects Models for Various Covariance Structures, in Volume 73;
- Beauchamp, Gary - The Influence of a Technology-rich Classroom Environment on Elementary Teachers' Pedagogy and Children's Learning, in Volume 34;
- Beck, Dominik - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
- Becker, George - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
- Beckett, Paul - Towards Nanocomputer Architecture, in Volume 6;
- Bedford, Gail K. - 'Theyyur Aye Now Sand in Theur' Jake 4.11 Years - Transition and the Importance of the Learning Environment, in Volume 34;
- The Gifts of Athena: Mindsets, Metaphors and Methods for 21st Century Learning, in Volume 34;
- Bednarik, Roman - Con�ictive animations as engaging learning tools, in Volume 88;
- Beecher, Bronwyn - Learning Technologies in Children's Social Contexts , in Volume 34;
- Beeson, Brett - A Portal for Grid-enabled Physics, in Volume 44;
- Beis, Mihalis - Large k-Separated Matchings of Random Regular Graphs, in Volume 38;
- Bekos, Michael A. - Polygons Labelling of Minimum Leader Length, in Volume 60;
- Beldiceanu, Nicolas - Dispensation Order Generation for Pyrosequencing, in Volume 29;
- Bell, Genevieve - Just Like Magic: Anthropological Musings on the History and Culture of Wireless Technologies, in Volume 62;
- Bell, Gordon - Realizing Memex... Digital Capture, Storage, and Utilization of All Personal Information, in Volume 82;
- Bell, Graeme - Forward Chaining for Robot and Agent Navigation using Potential Fields, in Volume 26;
- Bell, John - The Webworkforce - a learning repository to support educators, trainers and Information Technology courses, in Volume 20;
- Bell, Ron - Introduction to IEC 61508, in Volume 55;
- Bellgard, Matthew - Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources, in Volume 44;
- Bem, Derek - Computer forensics workshop for undergraduate students, in Volume 78;
- Bem, Ewa Z. - A Case for Teaching Computer Architecture, in Volume 20;
- Benatallah, Boualem - A Collaborative Approach for Caching Dynamic Data in Portal Applications, in Volume 27;
- A Framework for Managing the Evolution of Business Protocols in Web Services, in Volume 67;
- A Petri Net-based Model for Web Service Composition, in Volume 17;
- Dynamic Restructuring of Recovery Nets, in Volume 39;
- Patterns for e-service composition, in Volume 13;
- ServiceMosaic Project: Modeling, Analysis and Management of Web Services Interactions, in Volume 53;
- Bennamoun, Mohammed - Determining Termhood for Learning Domain Ontologies in a Probabilistic Framework, in Volume 70;
- Determining Termhood for Learning Domain Ontologies using Domain Prevalence and Tendency, in Volume 70;
- Integrated Scoring For Spelling Error Correction, Abbreviation Expansion and Case Restoration in Dirty Text, in Volume 61;
- Bennedsen, Jens - What does 'objects-first' mean? An international study of teachers' perceptions of objects-first, in Volume 88;
- Bennett, Graham - A Comparative Study of Probabalistic and Language Models for Information Retrieval, in Volume 75;
- Benwell, George L. - A Wavelet-Based Neuro-Fuzzy System for Data Mining Small Image Sets, in Volume 32;
- Benzie, David - The Gifts of Athena: Mindsets, Metaphors and Methods for 21st Century Learning, in Volume 34;
- Berbers, Yolande - A Tool for Component Based Design of Embedded Software, in Volume 10;
- Berger, Helmut - An Adaptive Information Retrieval System Based on Associative Networks, in Volume 31;
- Improving Domain Ontologies by Mining Semantics from Text, in Volume 31;
- Bergin, Joe - A Comparison of Different Approaches to the Introductory Programming Course, in Volume 52;
- Bergin, Susan - Automated Assessment in CS1, in Volume 52;
- Berglund, Anders - A doctoral course in research methods in computing education research. How should we teach it?, in Volume 88;
- Debating the OO debate: where is the problem?, in Volume 88;
- Differing Ways that Computing Academics Understand Teaching, in Volume 66;
- Five Myths of Assessment, in Volume 30;
- How does internationalisation affect learning and teaching of computer science: a study at Tongji University in China, in Volume 88;
- How Students Develop Concurrent Programs, in Volume 95;
- Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78;
- Qualitative Research Projects in Computing Education Research: An Overview, in Volume 52;
- Students learn CS in different ways: insights from an empirical study, in Volume 78;
- Students' understandings of concurrent programming, in Volume 88;
- What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
- Bergmann, Neil - Implementation of a Triple Modular Redundant FPGA based Safety Critical Systems for Reliable Software Execution, in Volume 69;
- Berlich, Rudiger - Grid Computing in Europe: From Research to Deployment, in Volume 44;
- Berlich, Ruediger - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54;
- Bernstein, Yaniv - Distributed Text Retrieval From Overlapping Collections, in Volume 63;
- Berretta, Regina - Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data, in Volume 38;
- The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction, in Volume 38;
- Berrigan, Rebecca - A Solar System Metaphor for 3D Visualisation of Object Oriented Software Metrics, in Volume 35;
- Berry, Marsha - Mobile Computing, Programming, Games and Online Communities: Changes to the Communicative Ecology of Design Students Through Mobile Computing: Part 2, in Volume 66;
- Mobile Computing, Visual Diaries, Learning and Communication: Changes to the Communicative Ecology of Design Students Through Mobile Computing, in Volume 52;
- Berry, Rodney - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
- Bertok, Peter - Pattern Categories: A Mathematical Approach for Organizing Design Patterns, in Volume 13;
- Bevinakoppa, Savitri - A Dihedral Angle Database of Short Sub-sequences for Protein Structure Prediction, in Volume 29;
- Beynon, Meurig - Contextualising information and communications technology in developing countries, in Volume 88;
- Bezdek, James C. - Approximate Data Mining in Very Large Relational Data, in Volume 49;
- Bhuvaneswaran, R.S. - Redundant Parallel Data Transfer Schemes for the Grid Environment, in Volume 54;
- Biddle, Robert - A Case for Iconic Icons, in Volume 50;
- A Case Study of Cartoon Visualisation Using AspectJ, in Volume 24;
- A Lightweight Web-Based Case Tool for UML Class Diagrams, in Volume 18;
- A Taxonomic Analysis of User-Interface Metaphors in the Microsoft Office Project Gallery, in Volume 40;
- A Web User Interface For An Interactive Software Repository, in Volume 28;
- Aspects to Visualising Reusable Components, in Volume 24;
- Clicki: A Framework for Light-weight Web-based Visual Applications, in Volume 40;
- Delegation Diagrams: Visual Support for the Development of Object-Oriented Designs, in Volume 28;
- Essential Use Cases and Responsibility in Object-Oriented Development, in Volume 4;
- Evaluating Scalable Vector Graphics for Use in Software Visualisation, in Volume 24;
- From Pushing Buttons to Play and Progress: Value and Interaction in Fable, in Volume 50;
- How (Not) To Help People Test Drive Code, in Volume 7;
- Icons R Icons, in Volume 18;
- InspectJ : Program Monitoring for Visualisation Using AspectJ, in Volume 16;
- Less Extreme Programming, in Volume 30;
- Metaphor and Metonymy in Object-Oriented Design Patterns, in Volume 4;
- Patterns for Essential Use Case Bodies, in Volume 13;
- Persuasive Interaction for Collectivist Cultures, in Volume 50;
- Postmodern Prospects for Conceptual Modelling, in Volume 53;
- Program Visualisation for Visual Programs, in Volume 7;
- Reflections on CRC Cards and OO Design, in Volume 10;
- Sokoban: A System Object Case Study, in Volume 10;
- Spreadsheet structure inspection using low level access and visualisation, in Volume 18;
- Spreadsheet Visualisation to Improve End-user Understanding, in Volume 24;
- Teaching the Evaluation of Object-Oriented Designs, in Volume 20;
- Using Software Visualisation to Enhance Online Component Markets, in Volume 35;
- Visualising 1,051 Visual Programs Module Choice and Layout in the Nord Modular Patch Language, in Volume 9;
- Visualising Reusable Software Over The Web, in Volume 9;
- XML Database Support for Program Trace Visualisation, in Volume 35;
- Bidwell, Nicola J. - Identifying Salient Learning Experiences: A Scenario-Based Method Enabling Industry-University Partnerships in IT, in Volume 20;
- Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
- Biham, Eli - A New Very Fast Stream Cipher : Tpy, in Volume 81;
- Billard, Angela - Access Control Models and Security Labelling, in Volume 62;
- Bille, Wesley - Conceptual Modeling for Virtual Reality, in Volume 83;
- Billerbeck, Bodo - Questioning Query Expansion: An Examination of Behaviour and Parameters, in Volume 27;
- Billhardt, Holger - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
- Billinghurst, Mark - Interaction With Partially Transparent Hands And Objects, in Volume 40;
- Billington, Jonathan - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12;
- Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels, in Volume 26;
- Creating an Internet Inter-ORB Protocol Service Specification, in Volume 12;
- Modelling and Initial Analysis of Operational Planning Processes using Coloured Petri Nets, in Volume 12;
- On Defining the Service Provided by TCP, in Volume 16;
- Towards Formal Specification and Analysis of Avionics Mission Systems, in Volume 12;
- Validating TCP Connection Management, in Volume 12;
- Bindhammer, T. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
- Binemann-Zdanowicz, Aleksander - Context-Aware Web Information Systems, in Volume 31;
- Bird, Linda - UML and XML Schema, in Volume 5;
- Biro, Jan C. - Recognition Sequences in the Restriction Endonucleases, in Volume 29;
- Biro, Josephine M.K. - Recognition Sequences in the Restriction Endonucleases, in Volume 29;
- Bishop, Pamela F. - Information and Communication Technology and School Leaders, in Volume 8;
- Bittner, Sven - Pruning Subscriptions in Distributed Publish/Subscribe Systems, in Volume 48;
- Blackburn, Terence - Enterprise-Enabled Ubiquitous Workspaces, in Volume 25;
- Blackmore, Karen L. - Identifying risks for cross-disciplinary higher degree research students, in Volume 78;
- Blackwell, Bruce - Oracle's Technology for Bioinformatics and Future Directions, in Volume 19;
- Blazejewski, Adam - Application of Self-Organizing Maps to Clustering of High-Frequency Financial Data, in Volume 32;
- Blazewicz, Jacek - On the complexity of the DNA Simplified Partial Digest Problem, in Volume 51;
- Blinman, Scott - Program Comprehension: Investigating the Effects of Naming Style and Documentation, in Volume 40;
- Boardman, Glenn - Structure Based Semantic Measurement for Information Filtering Agents, in Volume 85;
- Bobadilla, Jesus - The Effect of Sparsity on Collaborative Filtering Metrics, in Volume 92;
- Boden, Mikael - Comparing SVM Sequence Kernels: A Subcellular Localization Theme, in Volume 73;
- Higher Order HMMs for Localization Prediction of Transmembrane Proteins, in Volume 73;
- Multi-stage Redundancy Reduction: Effective Utilisation of Small Protein Datasets, in Volume 73;
- Bogdanovych, Anton - From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
- Bogeholz, Serge - A Case Study in Access Control Requirements for a Health Information System, in Volume 32;
- Bogorny, Vania - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83;
- Boier, Ioana - Analytics for Audit and Business Controls in Corporate Travel and Entertainment, in Volume 70;
- Boissieux, Laurence - Interactive Mediated Reality, in Volume 40;
- Bond, Trevor - Parents' and Students' Satisfaction with the Use of Information Technology in Government Schools in Queensland, Australia, in Volume 8;
- Bondy, Julian - Mining for offender group detection and story of a police operation, in Volume 70;
- Bordes, Nicole - 3D Visualisation of Tumours and Blood Vessels in Human Liver, in Volume 22;
- Grid services for e-archaeology, in Volume 82;
- High Resolution Scalable Displays: Manufacturing and Use, in Volume 35;
- Semi-Automatic Feature Delineation In Medical Images, in Volume 35;
- Bornat, Richard - Mental models, consistency and programming aptitude, in Volume 78;
- Borschbach, M. - Analysing MEG-Data by a Combination of Different Neural Networks, in Volume 19;
- Bottcher, Stefan - CSC: Supporting Queries on Compressed Cached XML, in Volume 92;
- Bottino, Rosa Maria - ICT, National Policies, and Impact on Schools and Teachers' Development, in Volume 23;
- Boughton, Clive - Beginning to Define a Body of Knowledge for Safety Practitioners, in Volume 15;
- Executable/Translatable UML in Computing Education, in Volume 30;
- Bouguettaya, Athman - Infrastructure for Ubiquitous Services, in Volume 75;
- Boukottaya, A. - Automating XML document Transformations: A conceptual modelling based approach, in Volume 31;
- Bourne, Philip - The Future of Bioinformatics, in Volume 29;
- Bower, Karyn - Managing Large Class Assessment, in Volume 30;
- Bower, Mat - Differing Ways that Computing Academics Understand Teaching, in Volume 66;
- Bower, Matt - A Learning System Engineering Approach to Developing Online Courses, in Volume 52;
- Bowers, Shawn - Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE, in Volume 31;
- Bowes, Janine - The Emerging Repertoire Demanded of Teachers of the Future : Surviving the Transition, in Volume 23;
- Box, Ilona - A citation analysis of the ACE2005 - 2007 proceedings, with reference to the June 2007 CORE conference and journal rankings, in Volume 78;
- A Citation Analysis of the ACSC 2006-2008 Proceedings, with Reference to the CORE Conference and Journal Rankings, in Volume 91;
- Assessing the Assessment: an Empirical Study of an Information Systems Development Subject, in Volume 20;
- Differing Ways that Computing Academics Understand Teaching, in Volume 66;
- Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52;
- Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78;
- Object-Oriented Analysis, Criterion-Referencing and Bloom, in Volume 30;
- Predictors of success in a first programming course, in Volume 52;
- VELNET (Virtual Environment for Learning Networking), in Volume 30;
- Boyd, Colin - Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets, in Volume 62;
- Defining Security Services for Electronic Tendering, in Volume 32;
- Five Sealed-bid Auction Models, in Volume 21;
- Formal Analysis of Secure Contracting Protocol for E-Tendering, in Volume 54;
- ID-based One-pass Authenticated Key Establishment, in Volume 81;
- Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework, in Volume 54;
- Provably Secure Key Exchange: an Engineering Approach, in Volume 21;
- Secure Key Issuing in ID-based Cryptography, in Volume 32;
- SKMA - A Key Management Architecture for SCADA Systems, in Volume 54;
- Strong Designated Verifier Signature in a Multi-user Setting, in Volume 98;
- Boyens, Claus - Privacy Conflicts in CRM Services for Online Shops: A Case Study, in Volume 14;
- Boykiw, Alan - Successful Studio-based Real-World Projects in IT Education, in Volume 20;
- Boyle, Martin - Formal and Informal Environments for the Learning and Teaching of Computer Programming, in Volume 23;
- Boyle, Michael - Display and Presence Disparity in Mixed Presence Groupware, in Volume 28;
- Brabrand, Claus - Constructive alignment and the SOLO taxonomy: a comparative study of university competences in computer science vs. mathematics, in Volume 88;
- Bradley, Daniel - Belief Based Risk Analysis, in Volume 32;
- Mesmerize - an Open Framework for Enterprise Security Management, in Volume 32;
- Brady, Sarah - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
- Brandl, Miriam - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
- Brankovic, Ljiljana - A Framework for Privacy Preserving Data Mining, in Volume 32;
- Brass, Peter - Constructing Optimal Highways, in Volume 65;
- Brent, Richard P. - On the Efficiency of Pollard's Rho Method for Discrete Logarithms, in Volume 77;
- Brereton, Margot - Ambient Interaction Framework - Software Infrastructure for the Rapid Development of Pervasive Computing Environments, in Volume 25;
- Talking about watching: Using the Video Card Game and wiki-web technology to engage IT students in developing observational skills, in Volume 20;
- Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
- Breton, Vincent - Evaluation of Unique Sequences on the European Data Grid, in Volume 19;
- Brewster, Stephen - Tactons: Structured Tactile Messages for Non-Visual Information Display, in Volume 28;
- Bright, Damien - Enterprise-Enabled Ubiquitous Workspaces, in Volume 25;
- Bringay, Sandra - S2MP: Similarity Measure for Sequential Patterns, in Volume 87;
- Britton, Carol - UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
- Brobst, Stephen - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
- Brock, Michael - State Aware WSDL, in Volume 82;
- Brodie-Tyrrell, William - Garbage Collection for Storage-Oriented Clusters, in Volume 26;
- Brook, Phillip W - Conversational KM - Student Driven Learning, in Volume 30;
- Brookes, Wayne - Computing Theory With Relevance, in Volume 30;
- What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
- Broughton, Michael - Virtual Planning Rooms (ViPR): A 3D Visualisation Environment for Hierarchical Information, in Volume 50;
- Brown, A.L. - Constructing Genome Scale Suffix Trees, in Volume 29;
- Brown, Chris M. - Signals in mRNAs that Influence the Initiation of Translation, in Volume 19;
- Brown, Curtis - Implementation and Indeterminacy, in Volume 37;
- Brown, Lorna M. - Tactons: Structured Tactile Messages for Non-Visual Information Display, in Volume 28;
- Brumen, Bostjan - Early Assessment of Classification Performance, in Volume 32;
- Brunton, Emma - Characterizing Image Properties for Digital Mammograms, in Volume 97;
- Brusa, Graciela - A Process for Building a Domain Ontology: an Experience in Developing a Government Budgetary Ontology, in Volume 72;
- Brusic, Vladimir - From Informatics to Bioinformatics, in Volume 19;
- Bruza, Peter - Combining Structure and Content Similarities for XML Document Clustering, in Volume 87;
- Dimensionality Reduction in Patch-Signature Based Protein Structure Matching, in Volume 49;
- Bryant, Darryn - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
- Bryant, Kay C. - A Methodology for the Design of Courses in Information Systems, in Volume 20;
- The Evaluation of Courses in Information Systems, in Volume 30;
- Buang, Norazwin - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
- Bubendorfer, Kris - A JMX Toolkit for Merging Network Management Systems, in Volume 48;
- A RMI Protocol for Aglets, in Volume 26;
- Auction Based Resource Negotiation in NOMAD, in Volume 38;
- Grid Resource Allocation : Allocation Mechanisms and Utilisation Patterns, in Volume 82;
- Improving Resource Utilisation in Market Oriented Grid Management and Scheduling, in Volume 54;
- Buchanan, George - The Challenge of Creating Cooperating Mobile Services: Experiences and Lessons Learned, in Volume 48;
- Buchmann, Volkert - Interaction With Partially Transparent Hands And Objects, in Volume 40;
- Buckle, Ashley - Impact of Grid Computing in Structural Biology, in Volume 99;
- Buckler, Ed - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29;
- Budd, Daryl - Visualization of Travel Itinerary Information on PDAs, in Volume 28;
- Budd, Peter - An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology, in Volume 68;
- Bui, Michael - Visualization of a Closed Three-Dimensional Surface using Portal-based Rendering, in Volume 60;
- Bulka, Andy - Design Pattern Automation, in Volume 13;
- Bullers, William I. Jr. - Personal Software Process in the Database Course, in Volume 30;
- Bundell, Gary A. - Determining Component Reliability Using a Testing Index, in Volume 4;
- Bunder, Martin - The Inhabitation Problem for Intersection Types, in Volume 77;
- Burgess, Scott A. - Steve Austin Versus the Symbol Grounding Problem, in Volume 37;
- Burmeister, Jay - Extending and Evaluating a Pattern Language for Safety-Critical User Interfaces, in Volume 3;
- Successful Studio-based Real-World Projects in IT Education, in Volume 20;
- Burmeister, Oliver K. - HCI Professionalism: Ethical Concerns in Usability Engineering, in Volume 1;
- Usability Testing: Revisiting Informed Consent Procedures for Testing Internet Sites, in Volume 1;
- Burnett, Mark - Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom, in Volume 21;
- Burton, Benjamin A. - Informatics Olympiads: Challenges in Programming and Algorithm Design, in Volume 74;
- Busch, Peter A. - Graphically Defining Articulable Tacit Knowledge, in Volume 2;
- Selected Tacit Knowledge Observations Within Two Organisations, in Volume 22;
- The graphical interpretation of plausible tacit knowledge flows, in Volume 24;
- Visual Mapping of Articulable Tacit Knowledge, in Volume 9;
- Butavicius, Marcus A. - An Empirical Evaluation of Chernoff Faces, Star Glyphs, and Spatial Visualisations for Binary Data, in Volume 24;
- Butler, Greg - Refactoring Use Case Models : The Metamodel, in Volume 16;
- Buttfield, Anna - A New Approach to Rapid Image Morphing for Lip Motion Synthesis, in Volume 16;
- Butts, Lee - An Evaluation of Mobile Phone Text Input Methods, in Volume 7;
- Buur, Jacob - Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
- Buys, Laurie - Data Mining in Conceptualising Active Ageing, in Volume 61;
- Buyya, Rajkumar - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
- A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68;
- Scheduling Parallel Applications on Utility Grids: Time and Cost Trade-off Management, in Volume 91;
- Bykova, Marina - Remote Revocation of Smart Cards in a Private DRM System, in Volume 44;
- Byrne-Armstrong, Hilary - Corporate Voices, Personal Voices: The Ethics of the Internet, in Volume 1;
Top of ListC - Caballero-Gil, Pino - Current Topics in Security of Mobile Ad-hoc NETworks, in Volume 81;
- Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences, in Volume 81;
- Caelli, Terry - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
- Caelli, William - Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98;
- Open Trusted Health Informatics Structure (OTHIS), in Volume 80;
- Privacy and Security in Open and Trusted Health Information Systems, in Volume 97;
- Securing Grid Data Using Mandatory Access Controls, in Volume 68;
- Caelli, William J. - DRM, Trusted Computing and Operating System Architecture, in Volume 44;
- Using Self-Defending Objects to Develop Security Aware Applications in Java, in Volume 26;
- Visually Sealed and Digitally Signed Documents, in Volume 26;
- Cafezeiro, Isabel - Semantic Interoperability via Category Theory, in Volume 83;
- Cai, Tom Weidong - A 3D Image Smoothing Method for Dynamic Functional Imaging, in Volume 2;
- A Solution to the Distribution and Standarization of Multimedia Medical Data in E-Health, in Volume 11;
- A Web Based Medical Image Data Processing and Management System, in Volume 2;
- A Web-based Collaborative System for Medical Image Analysis and Diagnosis, in Volume 2;
- Automatic Detection of PET Lesions, in Volume 22;
- Integrated Multimedia Medical Data Agent in E-Health, in Volume 11;
- Cajander, Asa - Evolution of an International Collaborative Student Project, in Volume 95;
- Calder, Paul - A Pattern Language for Pattern Language Structure, in Volume 13;
- A Pattern-Based Problem-Solving Process for Novice Programmers, in Volume 20;
- Applying Patterns to Novice Programming Problems, in Volume 13;
- Multi-Perspective Images for Visualisation, in Volume 11;
- Patterns in Learning to Program - An Experiment?, in Volume 30;
- Rendering Multi-Perspective Images with Trilinear Projection, in Volume 48;
- Visualising Phylogenetic Trees, in Volume 50;
- Caldon, Patrick - Using Text Classification to Predict the Gene Knockout Behaviour of S. Cerevisiae, in Volume 19;
- Caliusco, Maria Laura - A Process for Building a Domain Ontology: an Experience in Developing a Government Budgetary Ontology, in Volume 72;
- Calvert, Sandra L. - Production Features for Intrinsically Interesting Learning Environments, in Volume 34;
- Calvo, Rafael A. - Classification of Brain-Computer Interface Data, in Volume 87;
- Cameron, David - Storage and Data Management in EGEE, in Volume 68;
- Campbell, Brett - Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
- Cannane, Adam - Access-Ordered Indexes, in Volume 26;
- Indexing for Fast Categorisation, in Volume 16;
- Cannings, Terence - Bridging the Gap Between Theory and Practice in Preservice Education : The Use of Video Case Studies, in Volume 23;
- Online Constructionism and the Future of Teacher Education, in Volume 23;
- Cant, Tony - A Lightweight Approach to Formal Safety Architecture Assurance: The PARTI Case Study, in Volume 100;
- Computer-Based Safety Critical Systems in Defence: Def (Aust) 5679, in Volume 15;
- Guidance for Def (Aust) 5679 Issue 2, in Volume 100;
- Hierarchical Verification Environment, in Volume 55;
- Revision of Australian Defence Standard Def (Aust) 5679, in Volume 55;
- Cao, Jing - Formal Model of a Protocol Converter, in Volume 94;
- Cao, Jinli - A Flexible Payment Scheme and its Permission-Role Assignment, in Volume 16;
- Anonymous Access Scheme for Electronic Services, in Volume 26;
- Authorization Algorithms for the Mobility of User-Role Relationship, in Volume 38;
- Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations, in Volume 17;
- Ticket-Based Service Access Scheme for Mobile Users, in Volume 4;
- Cao, Longbing - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
- The Fish-eye Visualization of Foreign Currency Exchange Data Streams, in Volume 45;
- Cao, Shuping - Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
- Cao, Tri M. - A Simulation Framework for Knowledge Acquisition Evaluation, in Volume 38;
- Carbone, Angela - A Studio-Based Approach to Teaching Information Technology, in Volume 8;
- An Exploration of Internal Factors Influencing Student Learning of Programming, in Volume 95;
- Determination of Factors which Impact on IT Students' Propensity to Cheat, in Volume 20;
- From Informal to Formal: Creating the Australasian Computing Education Community, in Volume 30;
- ICT teaching and learning in a new educational paradigm: lecturers' perceptions versus students' experiences, in Volume 88;
- Performance and progression of first year ICT students, in Volume 78;
- The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
- Carlsen, Roger - Using an Educational Census to Reach Educational Technology Tipping Point, in Volume 23;
- Carlsson, Mats - Dispensation Order Generation for Pyrosequencing, in Volume 29;
- Caromel, Denis - Alias Analysis for Exceptions in Java, in Volume 4;
- Carreira, Joao - Nuisance Free Recognition of Hand Postures Over a Tabletop Display, in Volume 56;
- Carrington, David - An Approach to Specifying Software Frameworks, in Volume 26;
- Cross-Layer Verification of Type Flaw Attacks on Security Protocols, in Volume 62;
- Graph Drawing Aesthetics and the Comprehension of UML Class Diagrams: An Empirical Study, in Volume 9;
- UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
- Carrizo, Savrina F. - A Colour-Filling Approach For Visualising Trait Evolution With Phylogenies, in Volume 35;
- Phylogenetic Trees: An Information Visualisation Perspective, in Volume 29;
- Carter, Belinda M. - Customizing Internal Activity Behaviour for Flexible Process Enforcement, in Volume 27;
- Carter, Gary - Faster Group Operations on Elliptic Curves, in Volume 98;
- Carter, Simon - Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models, in Volume 16;
- Casas, Josep R. - Image-Based Multi-view Scene Analysis using 'Conexels', in Volume 56;
- Casati, Fabio - A Framework for Managing the Evolution of Business Protocols in Web Services, in Volume 67;
- Caseley, Paul - Measuring Safety: Applying PSM to the System Safety Domain, in Volume 33;
- Casey, Des - Performance and progression of first year ICT students, in Volume 78;
- Cassidy, Steve - DASMAS - Dialogue based Automation of Semantic interoperability in Multi Agent Systems, in Volume 58;
- Catchpoole, Daniel R. - Comparison of Visualization Methods of Genome-wide SNP Profiles in Childhood Acute Lymphoblastic Leukaemia, in Volume 87;
- Kernel-based Visualisation of Genes with the Gene Ontology, in Volume 87;
- Ceddia, Jason - Automating the Estimation of Project Size from Software Design Tools Using Modified Function Points, in Volume 30;
- WAT - A Tool for Classifying Learning Activities from a Log File, in Volume 66;
- Ceglar, Aaron - CURIO: A Fast Outlier and Outlier Cluster Detection Algorithm for Large Datasets, in Volume 84;
- Discovering Itemset Interactions, in Volume 91;
- Towards Active Conceptual Modelling for Sudden Events, in Volume 83;
- Cerecke, Carl - Repairing Syntax Errors in LR-based Parsers, in Volume 4;
- Cerone, Antonio - From Process Algebra to Visual Language, in Volume 12;
- Representing ASN.1 in Z, in Volume 21;
- Chadha, Urvashi - Incorporating Business Requirements and Constraints in Database Conceptual Model, in Volume 31;
- Chakka, Nagesh - Pathway to Functional Studies: Pipeline Linking Phylogenetic Footprinting and Transcription-Factor Binding Analysis, in Volume 73;
- Chambers, Dianne - Selecting the Right Technology for Students in a Changing Teaching Environment : A Case Study, in Volume 23;
- Chambers, Les - A Hazard Analysis of Human Factors in Safety-critical Systems Engineering, in Volume 55;
- Chamiel, Gil - Utilising Ontological Structure for Reasoning with Preferences, in Volume 90;
- Chan, Celyn S L - A System for Geographical and Spatial Data Exploration on the Internet, in Volume 2;
- Chan, Chee Y. - Building Trust in Third-party Components using Component Wrappers in the .NET Frameworks, in Volume 10;
- Chan, Darin - Context-Sensitive Mobile Database Summarisation, in Volume 16;
- Chan, Stephen - Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries, in Volume 63;
- Chan, Stephen C.F. - Using Emerging Pattern Based Projected Clustering and Gene Expression Data for Cancer Detection, in Volume 29;
- Chan, Tony K Y - A System for Geographical and Spatial Data Exploration on the Internet, in Volume 2;
- Chan, Yau Lin - Web-based Multimedia Collaboration System for Medical Images Analysis and Diagnosis, in Volume 22;
- Chandra, Andrias - Video Cataloguing and Browsing, in Volume 11;
- Chang, Ching-Lueh - Spreading of Messages in Random Graphs, in Volume 94;
- Testing Embeddability Between Metric Spaces, in Volume 77;
- Chang, Dempsey - Developing Gestalt-based Design Guidelines for Multi-sensory Displays, in Volume 57;
- Gestalt Theory in Visual Screen Design - A New Look at an Old Subject, in Volume 8;
- The Gestalt Principles of Similarity and Proximity Apply to Both the Haptic and Visual Grouping of Elements, in Volume 64;
- Chang, Elizabeth - Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling, in Volume 79;
- Chang, Hans - Displaying Linear Programs and Their Solutions With XML and SVG, in Volume 35;
- Chang, Hsuan T. - Visualisation and Comparison of DNA Sequences by Use of Three-Dimensional Trajectories, in Volume 19;
- Chang, Margaret Dah-Tsyr - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
- Chang, S. - On the Simultaneous Use of Clinical and Microarray Expression Data in the Cluster Analysis of Tissue Samples, in Volume 29;
- Chang, Tao-Ku - A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery, in Volume 63;
- Chang, Wei-Yuan - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
- Chang, Yan - A Hierarchical Approach in Multilevel Thresholding Based on Maximum Entropy and Bayes' Formula, in Volume 11;
- An Effective Multilevel Thresholding Approach Using Conditional Probability Entropy and Genetic Algorithm, in Volume 22;
- Comparison of Five Conditional Probabilities in 2-Level Image Threshold Based on Bayesian Formulation, in Volume 2;
- Chang, Yen-Jen - Sentry Tag: An Efficient Filter Scheme for Low Power Cache, in Volume 6;
- Chapman, Roderick - Correctness by Construction: a Manifesto for High Integrity Software, in Volume 55;
- Charlton, Philip - A Discriminant Analysis for Undersampled Data, in Volume 84;
- Chattaraj, Abhijit - Variable-length Intervals in Homology Search, in Volume 29;
- Chau, Rowena - A ConceptLink Graph for Text Structure Mining, in Volume 91;
- Discovering Parallel Text from The World Wide Web, in Volume 32;
- Chauchat, Jean-Hughes - Accuracy Estimation With Clustered Dataset, in Volume 61;
- Chawla, Ashish - A High Performance Kernel-Less Operating System Architecture, in Volume 38;
- Chawner, Brenda - Usability Evaluation of Library Online Catalogues, in Volume 50;
- Chee, Clinton - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
- Cheeseman, Paul - Are We Making Progress?, in Volume 100;
- Chen, Danny - Optimizing The Lazy DFA Approach for XML Stream Processing, in Volume 27;
- Chen, Ding-Yi - Determining the Fitness of a Document Model by Using Conflict Instances, in Volume 39;
- Chen, Dingyi - Ranking-Constrained Keyword Sequence Extraction from Web Documents, in Volume 92;
- Chen, Fang - Exploratory Study of Lexical Patterns in Multimodal Cues, in Volume 57;
- Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
- QuickFusion: Multimodal Fusion Without Time Thresholds, in Volume 57;
- Chen, Gen-Huey - Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network, in Volume 6;
- Chen, Guocai - Automatically Generated Consumer Health Metadata Using Semantic Spaces, in Volume 80;
- Chen, Hanxiong - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
- Chen, Hsin-Ming - Analysis of Hardware and Software Approaches to Embedded In-Circuit Emulation of Microprocessors, in Volume 6;
- Chen, Huiling - Classification Comparison of Prediction of Solvent Accessibility From Protein Sequences, in Volume 29;
- Chen, Jason - Useful Clustering Outcomes from Meaningful Time Series Clustering, in Volume 70;
- Chen, Jianfeng - Wearable Microphone Array as User Interface, in Volume 28;
- Chen, Jie - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
- Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
- Chen, Jinjun - A Min-Min Average Algorithm for Scheduling Transaction-Intensive Grid Workflows, in Volume 99;
- Key Research Issues in Grid Workflow Verification and Validation, in Volume 54;
- Chen, Jisong - Discovering Parallel Text from The World Wide Web, in Volume 32;
- Chen, Liang-Hua - An Integrated Approach to Video Retrieval, in Volume 75;
- Chen, Lin - A Case Study of Failure Mode Analysis with Text Mining Methods, in Volume 84;
- Chen, Shiping - Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
- Chen, Weidong - Aggregate Predicate Support in DBMS, in Volume 5;
- Chen, Xia - Determining the Fitness of a Document Model by Using Conflict Instances, in Volume 39;
- Ranking-Constrained Keyword Sequence Extraction from Web Documents, in Volume 92;
- Chen, Xing - A Semantic Associative Computation Method for Automatic Decorative-Multimedia Creation with 'Kansei' Information, in Volume 96;
- Chen, Yi-Ping Phoebe - A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights, in Volume 38;
- Extensible Detection and Indexing of Highlight Events in Broadcasted Sports Video, in Volume 48;
- Chen, Zhe - A Telemedicine System over Internet, in Volume 2;
- Automatic Detection of PET Lesions, in Volume 22;
- Cheng, Jingzhi - A Combined Model and a Varied Gibbs Sampling Algorithm Used for Motif Discovery, in Volume 29;
- Cheng, Kelvin - Direct Interaction with Large-Scale Display Systems using Infrared Laser tracking Devices, in Volume 24;
- Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction, in Volume 38;
- Cheon, Suh Hyun - Visualization by information type on mobile device, in Volume 60;
- Cheong, Otfried - Computing a Minimum-Dilation Spanning Tree is NP-hard, in Volume 65;
- Constructing Optimal Highways, in Volume 65;
- Cheow, Peng Yew - Representing and Reasoning on XForms Document, in Volume 27;
- Cherfi, Samira Si-said - Perceived vs. Measured Quality of Conceptual Schemas: An Experimental Comparison, in Volume 83;
- Cherif, Amar R. - A Framework Based Measurements for Evaluating an IS Quality, in Volume 79;
- Chesnevar, Carlos Ivan - An Argumentative Approach to Reasoning with Inconsistent Ontologies, in Volume 90;
- Chetty, Girija - Audio-Visual Multimodal Fusion for Biometric Person Authentication and Liveness Verification, in Volume 57;
- Video to the Rescue, in Volume 56;
- Cheung, Kingsley - A Resource Management Framework for Priority-Based Physical-Memory Allocation, in Volume 6;
- Cheung, Sherman - A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68;
- Cheung, William K. - Mobile Information Exchange and Integration: From Query to Application Layer, in Volume 92;
- Cheung, Y.T. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
- Chi, Xuebin - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
- Chicharo, Joe - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
- Chik, Desmond - Using Optical Flow for Step Size Initialisation in Hand Tracking by Stochastic Optimisation, in Volume 56;
- Chilcott, P. - An Evaluation of Web Services in the Design of a B2B Application, in Volume 26;
- Chin, Kuo-Hao - An Integrated Approach to Video Retrieval, in Volume 75;
- Chinneck, Paul - The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation, in Volume 47;
- Chiotti, Omar - A Process for Building a Domain Ontology: an Experience in Developing a Government Budgetary Ontology, in Volume 72;
- Chiu, Bill - We Have Seen the Future, and It Is Symbolic, in Volume 32;
- Chiu, ChiHuang - Aggregate Predicate Support in DBMS, in Volume 5;
- Chiu, Kenneth - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
- Chiu, Wah - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
- Chivers, William J. - A Grid Resource Allocation Mechanism for Heterogeneous E-waste Computers, in Volume 99;
- Cho, Andrew - JWS: A Flexible Web Service, in Volume 74;
- Cho, Joo Yeon - Formal Analysis of Card-based Payment Systems in Mobile devices, in Volume 54;
- Cho, Sung-Bae - Machine Learning in DNA Microarray Analysis for Cancer Classification, in Volume 19;
- Choi, Eric - Exploratory Study of Lexical Patterns in Multimodal Cues, in Volume 57;
- Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
- Choi, Eric H.C. - On Compensating the Mel-Frequency Cepstral Coefficients for Noisy Speech Recognition, in Volume 48;
- Choi, Jong Pill - wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability, in Volume 87;
- Choi, Kelvin - Dynamic Measurement of Polymorphism, in Volume 62;
- Choi, Ryan H. - Efficient XQuery Join Processing in Publish/Subscribe Systems, in Volume 92;
- Chong, C.F. - Tuning the Collision Test for Power, in Volume 26;
- Chong, Suan Khai - On pedagogically sound examples in public-key cryptography, in Volume 48;
- Chong, Wen Haw - On Inconsistencies in Quantifying Strength of Community Structures, in Volume 87;
- Choo, Kim-Kwang Raymond - Formal Analysis of Secure Contracting Protocol for E-Tendering, in Volume 54;
- Chou, Pauline LienHua - Efficiently Computing the Top N Averages in Iceberg Cubes, in Volume 16;
- Chow, K.P. - Tuning the Collision Test for Power, in Volume 26;
- Chow, Yang-Wai - Human Visual Perception of Region Warping Distortions, in Volume 48;
- Large Object Segmentation with Region Priority Rendering, in Volume 38;
- Christen, Peter - A Two-Step Classification Approach to Unsupervised Record Linkage, in Volume 70;
- Evaluation of a Graduate Level Data Mining Course with Industry Participants, in Volume 70;
- Exploratory Multilevel Hot Spot Analysis: Australian Taxation Office Case Study, in Volume 70;
- Febrl - A Freely Available Record Linkage System with a Graphical User Interface, in Volume 80;
- Towards Automated Record Linkage, in Volume 61;
- Towards Scalable Real-Time Entity Resolution using a Similarity-Aware Inverted Index Approach, in Volume 87;
- Chu, Jia-Han - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
- Chu, Wanming - Metacube - A New Interconnection Network for Large Scale Parallel Systems, in Volume 6;
- Chu, Xingchen - A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68;
- Chun, Jonghun - Automated Data Warehousing for Rule-based CRM Systems, in Volume 17;
- Chung, A.L.S. - Teacher Empowerment and Minimalist Design, in Volume 23;
- Chung, Fu-lai - Using Emerging Pattern Based Projected Clustering and Gene Expression Data for Cancer Detection, in Volume 29;
- Chung, Jaewoo - AreWeThereYet? - A Temporally Aware Media Player, in Volume 76;
- Chung, Vera - QuickFusion: Multimodal Fusion Without Time Thresholds, in Volume 57;
- Chung, Voon-Li - The Development of a Distributed Capability System for VLOS, in Volume 6;
- Towards Customisable Tuple Field Matching in VLOS, in Volume 16;
- Church, W. Bret - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19;
- Informative 3D Visualization of Multiple Protein Structures, in Volume 29;
- Churcher, Clare - An Interactive Visualisation for Investigating DNA Sequence Information, in Volume 35;
- An Interactive Visualisation for Selecting PCR Primers, in Volume 45;
- Churcher, Neville - Building Virtual Worlds with the Big-Bang Model, in Volume 9;
- Constructing Real-Time Collaborative Software Engineering Tools Using CAISE, an Architecture for Supporting Tool Development, in Volume 48;
- Displaying Linear Programs and Their Solutions With XML and SVG, in Volume 35;
- Informing the Design of Pipeline-Based Software Visualisations, in Volume 45;
- Inhomogeneous Force-Directed Layout Algorithms in the Visualisation Pipeline: From Layouts to Visualisations, in Volume 35;
- Modelling and Measuring Collaborative Software Engineering, in Volume 38;
- Visualising Class Cohesion with Virtual Worlds, in Volume 24;
- XML in the Visualisation Pipeline, in Volume 11;
- Ciavarella, Michael - Lossless Image Compression Using Pixel Reordering, in Volume 26;
- Ciesielski, Vic - Automatic Music Classification Problems, in Volume 26;
- Cikara, S. - Modelling Layer 2 and Layer 3 Device Bandwidths using B-Node Theory, in Volume 48;
- Cios, Krzysztof J. - Structure-Based Document Model with Discrete Wavelet Transforms and Its Application to Document Classification, in Volume 87;
- Citro, Sandy - Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures, in Volume 62;
- Clark, Andrew - Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks, in Volume 54;
- Synapse: Auto-correlation and Dynamic Attack Redirection in an Immunologically-inspired IDS, in Volume 54;
- Clark, Graham - Measuring Safety: Applying PSM to the System Safety Domain, in Volume 33;
- Clark, Nicole - Evaluating Student Teams Developing Unique Industry Projects, in Volume 42;
- Peer Testing in Software Engineering Projects, in Volume 30;
- Self and Peer Assessment in Software Engineering Projects, in Volume 42;
- Clark, Ted - Disadvantages of Collaborative Online Discussion and the Advantages of Sociability, Fun and Cliques for Online Learning, in Volume 23;
- Clarke, Bill - Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU, in Volume 62;
- Implemention Aspects of a SPARC V9 Complete Machine Simulator, in Volume 4;
- Clarke, Brett - Corporate Curricula in Schools: Issues and Implementation, in Volume 8;
- Clarke, Peter J. - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
- Clarke, Sally - Developing Case Studies to Enhance Student Learning, in Volume 42;
- Clear, Tony - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
- Motivational Patterns in Virtual Team Collaboration, in Volume 42;
- Surely We Must Learn to Read before We Learn to Write!, in Volume 95;
- The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78;
- Using SoDIS as a Risk Analysis Process: A Teaching Perspective, in Volume 30;
- Clement, Christopher - An Experimental Study on Algorithms for Drawing Binary Trees, in Volume 60;
- Clifton, Chris - Preface: Proceedings of the ICDM 2002 Workshop on Privacy, Security and Data Mining, in Volume 14;
- Cloete, Ian - Neural Networks and Financial Trading and the Efficient Markets Hypothesis, in Volume 4;
- Close, Benjamin S. - TIDL: Mixed Presence Groupware Support for Legacy and Custom Applications, in Volume 50;
- Cochran, Duncan A. E. - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
- Cockburn, Andy - Aiding Text Entry of Foreign Alphabets with Visual Keyboard Plus, in Volume 40;
- An Evaluation of Mobile Phone Text Input Methods, in Volume 7;
- Evaluating Swiftpoint as a Mobile Device for Direct Manipulation Input, in Volume 64;
- Evaluation of Two Textual Programming Notations for Children, in Volume 40;
- Get a Way Back : Evaluating Retrieval from History Lists, in Volume 18;
- Program Comprehension: Investigating the Effects of Naming Style and Documentation, in Volume 40;
- Rapid Visual Flow: How Fast Is Too Fast?, in Volume 28;
- Revisiting 2D vs 3D Implications on Spatial Memory, in Volume 28;
- The Design and Evaluation of a Flick Gesture for 'Back' and 'Forward' in Web Browsers, in Volume 18;
- The Effects of Menu Parallelism on Visual Search and Selection, in Volume 76;
- Coddington, Paul - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
- Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
- Coddington, Paul D. - Communication Performance Issues for Two Cluster Computers, in Volume 16;
- Extensible Job Managers for Grid Computing, in Volume 16;
- Coddington, Paul D. - A Simplified Approach to Web Service Development, in Volume 54;
- Coggins, Richard - Application of Self-Organizing Maps to Clustering of High-Frequency Financial Data, in Volume 32;
- Cohen, Jeremy - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
- Colbert, Bernard - The Symmetry Ratio of a Network, in Volume 41;
- Colbert, Bernard D. - Network Robustness and Graph Topology, in Volume 26;
- Coldwell, Jo - It is possible to teach computer ethics via distance education!, in Volume 1;
- Cole, Linda - An Experimental Evaluation of Property Precedence in Conceptual Modelling, in Volume 31;
- Coleman, Tom - On The Complexity of Manipulating Elections, in Volume 65;
- Collberg, Christian - A Functional Taxonomy for Software Watermarking, in Volume 4;
- Colnet, Dominique - Lisaac: the power of simplicity at work for operating system, in Volume 10;
- Colomb, Robert - Process Modelling: The Deontic Way, in Volume 53;
- Colomb, Robert M. - Managing Ontologies: A Comparative Study of Ontology Servers, in Volume 63;
- Using Ontologies to Index Conceptual Structures for Tendering Automation, in Volume 5;
- Colpoys, Linda - Graph Drawing Aesthetics and the Comprehension of UML Class Diagrams: An Empirical Study, in Volume 9;
- UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
- Colton, Don - Simple Eight Bit, Emulated Computers for Illustrating Computer Architecture Concepts and Providing a Starting Point for Student Designs, in Volume 66;
- Colvin, R. - Translating Refined Logic Programs to Mercury, in Volume 4;
- Compton, Michael - Stenning's Protocol Implemented in UDP and Verified in Isabelle, in Volume 41;
- What is Required in Business Collaboration?, in Volume 92;
- Compton, Paul - A Simulation Framework for Knowledge Acquisition Evaluation, in Volume 38;
- Comyn-Wattiau, Isabelle - Perceived vs. Measured Quality of Conceptual Schemas: An Experimental Comparison, in Volume 83;
- Conmy, Philippa - High Level Failure Analysis for Integrated Modular Avionics, in Volume 3;
- Safety Assurance Contracts for Integrated Modular Avionics, in Volume 33;
- Connelly, Simon - Extending and Evaluating a Pattern Language for Safety-Critical User Interfaces, in Volume 3;
- Modelling Erroneous Operator Behaviours for an Air-Traffic Control Task, in Volume 7;
- Conrad, Stefan - Relational.OWL - A Data and Schema Representation Format Based on OWL, in Volume 43;
- Cook, Carl - Constructing Real-Time Collaborative Software Engineering Tools Using CAISE, an Architecture for Supporting Tool Development, in Volume 48;
- Inhomogeneous Force-Directed Layout Algorithms in the Visualisation Pipeline: From Layouts to Visualisations, in Volume 35;
- Modelling and Measuring Collaborative Software Engineering, in Volume 38;
- Cook, Deirdre - 'Schoolish Things' or Playful Practices? ICT Use and Teachers' Views, in Volume 34;
- The Question is No Longer 'If', but 'How Best', ICT can be Used in Early Years Practice, in Volume 34;
- Cook, Duncan - Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists, in Volume 54;
- Cooney, Dominic - A Programming Language for Web Service Development, in Volume 38;
- Cooper, Brenton - Translation of Rights Expressions, in Volume 44;
- Cooper, David - Java Implementation Verification Using Reverse Engineering, in Volume 26;
- The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
- Cooper, James - Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides, in Volume 62;
- Cooper, Tom J. - Integrating Concrete and Virtual Materials in an Elementary Mathematics Classroom: A Case Study of Success with Fractions, in Volume 8;
- Cope, Chris - Differing Ways that Computing Academics Understand Teaching, in Volume 66;
- Cope, Jared - Automated Discovery of Search Interfaces on the Web, in Volume 17;
- Coplien, James O. - Symmetry in Class and Type Hierarchy, in Volume 10;
- Corbett, Dan - A Formalization of Subjective and Objective Time Ontologies, in Volume 85;
- Corman, Amy - QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks, in Volume 62;
- Costa, Vaston - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
- Cowan, Greig A. - Storage and Data Management in EGEE, in Volume 68;
- Coxson, Allan - 'When the Regulator Calls', in Volume 100;
- Craig, Annemieke - Intervention Programmes to Recruit Female Computing Students: Why Do Programme Champions Do It?, in Volume 95;
- Craik, Andrew - Reasoning about Data Parallelism in Modern Object-Oriented Languages, in Volume 74;
- Cramp, Anthony - Employing Hierarchical Federation Communities in the Virtual Ship Architecture, in Volume 4;
- Crane, Denis I. - Quantification of Neural Images using Grey Difference, in Volume 73;
- Cranefield, Stephen - Educational Experiences From a Global Software Engineering (GSE) Project, in Volume 30;
- Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory, in Volume 26;
- Craswell, Nick - Automated Discovery of Search Interfaces on the Web, in Volume 17;
- How Valuable is External Link Evidence When Searching Enterprise Webs?, in Volume 27;
- Performance and Cost Tradeoffs in Web Search, in Volume 27;
- Creek, Alan - Building Virtual Worlds with the Big-Bang Model, in Volume 9;
- Cregan, Anne M. - Towards a Science of Definition, in Volume 58;
- Crehan, Anna Corbo - Mabo-Style Claims to the Radio Spectrum, in Volume 1;
- Crespo, Jose - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
- Crimmins, Francis - How Valuable is External Link Evidence When Searching Enterprise Webs?, in Volume 27;
- Performance and Cost Tradeoffs in Web Search, in Volume 27;
- Crisp, David J. - A Useful Bound for Region Merging Algorithms in a Bayesian Model, in Volume 16;
- Fast Segmentation of Large Images, in Volume 16;
- Croft, Bruce - The Future of Web Search, in Volume 4;
- Croll, Peter - Open Trusted Health Informatics Structure (OTHIS), in Volume 80;
- Security Enhanced Linux to Enforce Mandatory Access Control in Health Information Systems, in Volume 80;
- Croll, Peter R. - A Data Warehouse Architecture for Clinical Data Warehousing, in Volume 68;
- Securing Grid Data Using Mandatory Access Controls, in Volume 68;
- Crump, Barbara J. - New Arrival Students: Mitigating Factors on the Culture of the Computing Learning Environment, in Volume 30;
- Cui, Bin - Diagonal Ordering: A New Approach to High-Dimensional KNN Processing, in Volume 27;
- Exploring Bit-Difference for Approximate KNN Search in High-dimensional Databases, in Volume 39;
- Cunningham, Andrew - Target Motion Analysis Visualisation, in Volume 45;
- Cunningham, Colleen - A Taxonomy of Customer Relationship Management Analyses for Data Warehousing, in Volume 83;
- Cuppens-Boulahia, Nora - Deploying Access Control in Distributed Workflow, in Volume 81;
- Cuppens, Frederic - Deploying Access Control in Distributed Workflow, in Volume 81;
- Curatolo, Raymond - Analytics for Audit and Business Controls in Corporate Travel and Entertainment, in Volume 70;
- Cutts, Quintin - Connecting Learning Environments Using Electronic Voting Systems, in Volume 42;
- Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52;
- Predictors of success in a first programming course, in Volume 52;
- The ability to articulate strategy as a predictor of programming skill, in Volume 52;
- Cybulski, Jacob L. - A Set of Patterns for the Web-based Interfaces of an Employee Services System, in Volume 13;
- Czezowski, Adam - Implemention Aspects of a SPARC V9 Complete Machine Simulator, in Volume 4;
Top of ListD - D'Onofrio, Salvatore - Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform, in Volume 44;
- D'Souza, Daryl - A Taxonomic Study of Novice Programming Summative Assessment, in Volume 95;
- Software Development Marketplaces - Implications for Plagiarism, in Volume 66;
- Transforming learning of programming: a mentoring project, in Volume 78;
- da Silva, Geiza M. H. - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
- Dabrowski, Christopher - Using Markov Chain Analysis to Study Dynamic Behaviour in Large-Scale Grid Systems, in Volume 99;
- Daggard, Grant - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61;
- A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73;
- Dagger, Paul - Securing Distributed Computing Against the Hostile Host, in Volume 26;
- Dagiene, Valentina - Focus on the Pedagogical Dimension in ICT Literacy for Teachers, in Volume 23;
- Dahl, Bettina - Constructive alignment and the SOLO taxonomy: a comparative study of university competences in computer science vs. mathematics, in Volume 88;
- Daiqin He, Daisy - What is Required in Business Collaboration?, in Volume 92;
- Dale, Robert - CORAL : Using Natural Language Generation for Navigational Assistance, in Volume 16;
- Language Technology and Software Internationalisation, in Volume 32;
- Natural Language Processing in the Undergraduate Curriculum, in Volume 20;
- Dalrymple, Brian P. - Towards an understanding of protein-protein interaction network heirarchies. Analysis of DnaN-binding peptide motifs in members of protein families interacting with the eubacterial processivity clamp, the subunit of DNA Polymerase III, in Volume 19;
- Dalziel, James - Trust Requirements in Identity Management, in Volume 44;
- Dampney, C.N.G. (Kit) - Selected Tacit Knowledge Observations Within Two Organisations, in Volume 22;
- The graphical interpretation of plausible tacit knowledge flows, in Volume 24;
- Visual Mapping of Articulable Tacit Knowledge, in Volume 9;
- Dance, Sandy - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26;
- Dang, Xuan Hong - Discovering Frequent Sets from Data Streams with CPU Constraint, in Volume 70;
- Dani, Anita - Conceptual Modelling of Computations On Data Streams, in Volume 43;
- Daniel, Mats - Evolution of an International Collaborative Student Project, in Volume 95;
- Daniels, Mats - A learning theory perspective on running open ended group projects (OEGPs), in Volume 78;
- Five Myths of Assessment, in Volume 30;
- Open Ended Group Projects a 'Tool' for More Effective Teaching, in Volume 20;
- Qualitative Research Projects in Computing Education Research: An Overview, in Volume 52;
- Danko, Ondrej - Elliptic Indexing of Multidimensional Databases, in Volume 92;
- Danner, Norman - Circuit Principles and Weak Pigeonhole Variants, in Volume 41;
- Dantin, Ursula - Application of Personas in User Interface Design for Educational Software, in Volume 42;
- Darlington, John - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
- Darwish, Nevin - A Study of Local and Global Thresholding Techniques in Text Categorization, in Volume 61;
- Dasgupta, Aniruddha - CASO: A Framework for dealing with objectives in a constraint-based extension to AgentSpeak(L), in Volume 48;
- Dash, Manoranjan - Graphics Hardware based Efficient and Scalable Fuzzy C-Means Clustering, in Volume 87;
- Datta, Amitava - Dependable Dynamic Source Routing without a Trusted Third Party, in Volume 38;
- Datta, Somnath - An Empirical Bayes Adjustment to Multiple p-values for the Detection of Differentially Expressed Genes in Microarray Experiments, in Volume 29;
- Datta, Susmita - An Empirical Bayes Adjustment to Multiple p-values for the Detection of Differentially Expressed Genes in Microarray Experiments, in Volume 29;
- Dattasharma, Abhi - Identifying Stock Similarity Based on Multi-event Episodes, in Volume 87;
- Davies, Janet - Applications of variation theory in computing education, in Volume 88;
- Davies, Pam - Self and Peer Assessment in Software Engineering Projects, in Volume 42;
- Davis, Lynne - Comparing SVM Sequence Kernels: A Subcellular Localization Theme, in Volume 73;
- Dawes, Ian - Learning Causal Networks from Microarray Data, in Volume 73;
- Dawson, Ed - A Range Test Secure in the Active Adversary Model, in Volume 68;
- Algebraic Analysis of LEX, in Volume 98;
- Commitment Issues in Delegation Process, in Volume 81;
- Faster Group Operations on Elliptic Curves, in Volume 98;
- Five Sealed-bid Auction Models, in Volume 21;
- Secure Key Issuing in ID-based Cryptography, in Volume 32;
- SKMA - A Key Management Architecture for SCADA Systems, in Volume 54;
- Dawson, Jeremy E. - Termination of Abstract Reduction Systems, in Volume 65;
- Dawson, Robert - SKMA - A Key Management Architecture for SCADA Systems, in Volume 54;
- Day, Adam - On Process Complexity, in Volume 94;
- Dayalan, Saravanan - A Dihedral Angle Database of Short Sub-sequences for Protein Structure Prediction, in Volume 29;
- de Albuquerque, Eduardo Simoes - Interactive Optimization in Cooperative Environments, in Volume 60;
- De Bosschere, Koen - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
- de Laborda, Cristian Perez - Relational.OWL - A Data and Schema Representation Format Based on OWL, in Volume 43;
- de Raadt, Michael - An evaluation of electronic individual peer assessment in an introductory programming course, in Volume 88;
- Chick Sexing and Novice Programmers: Explicit Instruction of Problem Solving Strategies, in Volume 52;
- Computer Assisted Assessment of SQL Query Skills, in Volume 63;
- Incorporating programming strategies explicitly into curricula, in Volume 88;
- Introductory Programming: What's Happening Today and Will There Be Anyone to Teach Tomorrow?, in Volume 30;
- Language Tug-Of-War: Industry Demand and Academic Choice, in Volume 20;
- Predictors of success in a first programming course, in Volume 52;
- Teaching and Assessing Programming Strategies Explicitly, in Volume 95;
- The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
- De Roeck, Anne - Measuring Improvement in Latent Semantic Analysis-Based Marking Systems: Using a Computer to Mark Questions about HTML, in Volume 66;
- de Silva, Lavindra - Planning with Time Limits in BDI Agent Programming Languages, in Volume 65;
- De Troyer, Olga - Conceptual Modeling for Virtual Reality, in Volume 83;
- de Vasconcelos, Davi Romero - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
- de Vries, Denise - A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values, in Volume 16;
- Defining and Implementing Domains with Multiple Types using Mesodata Modelling Techniques, in Volume 53;
- Discovering Itemset Interactions, in Volume 91;
- Towards Active Conceptual Modelling for Sudden Events, in Volume 83;
- de Vrieze, P. - Transformation selection for aptness-based web retrieval, in Volume 39;
- Dean, David - Audio-Visual Speaker Verification using Continuous Fused HMMs, in Volume 56;
- Debenham, John - Modelling Enterprise Architectures: An Approach Based on Linking Metaphors and Ontologies, in Volume 58;
- Weighted Kernel Model For Text Categorization, in Volume 61;
- Dehnadi, Saeed - Mental models, consistency and programming aptitude, in Volume 78;
- Dehne, Frank - A Template Based Static Coalition Protocol - A3PviGrid, in Volume 54;
- Dekeyser, Stijn - A Framework for Role-based group delegation in distributed environment, in Volume 48;
- Computer Assisted Assessment of SQL Query Skills, in Volume 63;
- Conflict Scheduling of Transactions on XML Documents, in Volume 27;
- Peer-to-Peer Form Based Web Information Systems, in Volume 49;
- Towards a Definition and Model for Metadata File Systems, in Volume 74;
- Dekker, Anthony - Planning with Time Limits in BDI Agent Programming Languages, in Volume 65;
- Visualisation of Social Networks Using CAVALIER, in Volume 9;
- Dekker, Anthony H. - Network Robustness and Graph Topology, in Volume 26;
- Simulating Network Robustness for Critical Infrastructure Networks, in Volume 38;
- The Symmetry Ratio of a Network, in Volume 41;
- Delcambre, Lois - Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE, in Volume 31;
- Delcambre, Lois M. L. - Capturing Users' Everyday, Implicit Information Integration Decisions, in Volume 83;
- Delwadia, Vipul - Using Remotely Executing Software via a Mobile Device, in Volume 93;
- Demmers, Pieter - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
- Deng, Da - A Wavelet-Based Neuro-Fuzzy System for Data Mining Small Image Sets, in Volume 32;
- Visualisation and Comparison of Image Collections based on Self-organised Maps, in Volume 32;
- Deng, Dixon D. S. - High-speed Parameterisable Hough Transform Using Reconfigurable Hardware, in Volume 11;
- Deng, Sungen - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
- Deng, Xiaotie - Exact Pattern Matching for RNA Secondary Structures, in Volume 29;
- Denning, Tim - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
- Denny - Exploratory Multilevel Hot Spot Analysis: Australian Taxation Office Case Study, in Volume 70;
- Denny, Paul - Quality of Student Contributed Questions Using PeerWise, in Volume 95;
- The PeerWise system of student contributed assessment questions, in Volume 78;
- Deogun, Jitender S. - EMAGEN: An Efficient Approach to Multiple Whole Genome Alignment, in Volume 29;
- Local Prediction Approach of Protein Classification using Probabilistic Suffix Trees, in Volume 29;
- RNA Secondary Structure Prediction with Simple Pseudoknots, in Volume 29;
- Deray, Kristine - Avatars: A Shifting Interaction, in Volume 11;
- Dermoudy, Julian - A Novel Approach to Parenting in Functional Program Evaluation, in Volume 16;
- An Anti-Plagiarism Editor for Software Development Courses, in Volume 42;
- Engendering an Empathy for Software Engineering, in Volume 42;
- Dessmark, Anders - On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
- Detmold, Henry - A Domain Specific Language for Execution Profiling and Regulation, in Volume 91;
- Garbage Collection for Storage-Oriented Clusters, in Volume 26;
- Implementing a Family of Distributed Garbage Collectors, in Volume 16;
- Deva, Paresh - JWS: A Flexible Web Service, in Volume 74;
- Diaconescu, Roxana E. - Distributed Component Architecture for Scientific Applications, in Volume 10;
- Diamond, Dermot - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
- Dick, Geoffrey N. - Computer-based Collaboration in Student Work: Does a Preference for using Technology Affect Performance?, in Volume 46;
- Dick, Grant - On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma, in Volume 26;
- Dick, Martin - Adopting XP Practices for Teaching Object Oriented Programming, in Volume 52;
- Automating the Estimation of Project Size from Software Design Tools Using Modified Function Points, in Volume 30;
- Determination of Factors which Impact on IT Students' Propensity to Cheat, in Volume 20;
- Using Extreme Programming in a Capstone Project, in Volume 30;
- Diebold, Boris - Usage-based Visualization of Web Locations, in Volume 9;
- Dieperink, Carel - Improving Environmental Decision-making: Bridging the Gap between Conceptual Modelling and Quantitative Analyses with Quasta, in Volume 83;
- Diepeveen, Dean - The application of data mining techniques to characterize agricultural soil profiles, in Volume 70;
- Dietrich, Jens - Survey of Existing Languages to Model Interactive Web Applications, in Volume 79;
- Dillon, Tharam - Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling, in Volume 79;
- Dillon, Tharam S. - A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively, in Volume 38;
- Dine, Gerald - Evaluation of Unique Sequences on the European Data Grid, in Volume 19;
- Ding, Yi - Recency-Based Collaborative Filtering, in Volume 49;
- Disseldorp, Bronwyn - Selecting the Right Technology for Students in a Changing Teaching Environment : A Case Study, in Volume 23;
- Dittenbach, Michael - An Adaptive Information Retrieval System Based on Associative Networks, in Volume 31;
- Improving Domain Ontologies by Mining Semantics from Text, in Volume 31;
- Dittmann, Henrik - Extraction, evaluation and integration of lexical-semantic relations for the automated construction of a lexical ontology, in Volume 85;
- Ditze, Michael - Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices, in Volume 26;
- do Nascimento, Hugo A. Dantas - Interactive Optimization in Cooperative Environments, in Volume 60;
- do Nascimento, Hugo A.D. - A Framework for Human-Computer Interaction in Directed Graph Drawing, in Volume 9;
- A System for Graph Clustering Based on User Hints, in Volume 2;
- User Hints for Map Labelling, in Volume 16;
- Dobbie, Gill - Sketching ER Diagrams, in Volume 93;
- Dobbie, Gillian - A Maturity Model for Computing Education, in Volume 66;
- Automated Usability Testing Framework, in Volume 76;
- Databases, But Not As We Know Them, in Volume 27;
- Mining Association Rules from XML Data using XQuery, in Volume 32;
- Towards Verifying Semistructured Data, in Volume 67;
- Dobele, Tony - This Course Has A Bloom Rating Of 3.9, in Volume 30;
- Doerr, Martin - The CIDOC Conceptual Reference Model - A New Standard for Knowledge Sharing, in Volume 83;
- Doherty, Michelle - 3D Visualisation of Tumours and Blood Vessels in Human Liver, in Volume 22;
- Doi, Atsushi - Integrating Biopathway Databases for Large-scale Modeling and Simulation, in Volume 29;
- Dong, Ce - Merging Dynamic Functionality: Integration of XML Transformations, in Volume 67;
- Static Analysis of XSLT Programs, in Volume 27;
- Dongol, Brijesh - Concurrent Program Design in the Extended Theory of Owicki and Gries, in Volume 41;
- Donis, Ruben - RNA Secondary Structure Prediction with Simple Pseudoknots, in Volume 29;
- Donohoo, Andrew - Layered Earth Inversion Visual Toolkit: A Scientific Visualisation Case Study, in Volume 11;
- Donovan, Jared - Talking about watching: Using the Video Card Game and wiki-web technology to engage IT students in developing observational skills, in Volume 20;
- Work at Hand: An Exploration of Gesture in the Context of Work and Everyday Life to Inform the Design of Gestural Input Devices, in Volume 18;
- Dooley, Laurence - Gestalt Theory in Visual Screen Design - A New Look at an Old Subject, in Volume 8;
- dos Santos, Neide - Applying Ontologies in the Integration of Heterogeneous Relational Databases, in Volume 58;
- Doucet, Anne - A Two-Phase Commit Protocol for Mobile Wireless Environment, in Volume 39;
- Dowling, Carolyn - Intelligent Agents: Some Ethical Issues and Dilemmas, in Volume 1;
- The Role of the Human Teacher in Learning Environments of the Future, in Volume 23;
- Dowling, Greg - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42;
- Dowling, Jason - Characterizing Image Properties for Digital Mammograms, in Volume 97;
- Downes, Toni - Raising the Standards : ICT and the Teacher of the Future, in Volume 23;
- The Playable Computer: Young Children's Home Computing Experiences , in Volume 34;
- Young Children Talking about Their Use of the Internet at Home and at School , in Volume 34;
- Downey, Rodney G. - Bounded Persistence Pathwidth, in Volume 41;
- Doyle, Bernard - Why Teach Unix?, in Volume 66;
- Drago, Sara - From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
- Dras, Mark - A Two-Pronged Attack on the Dragon of Intractability, in Volume 38;
- Approaches for Semantic Interoperability between Domain Ontologies, in Volume 72;
- DASMAS - Dialogue based Automation of Semantic interoperability in Multi Agent Systems, in Volume 58;
- Drias, Habiba - A Two-Phase Commit Protocol for Mobile Wireless Environment, in Volume 39;
- Drummond, Alexei - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29;
- Drury, Helen - Student satisfaction with groupwork in undergraduate computer science : do things get better?, in Volume 20;
- du Boulay, Douglas - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
- Du, Jiang - Performance Factors Analysis of a Wavelet-based Watermarking Method, in Volume 44;
- Recovery of Watermark Using Differential Affine Motion Estimation, in Volume 44;
- Du, Rong - Defining Security Services for Electronic Tendering, in Volume 32;
- Formal Analysis of Secure Contracting Protocol for E-Tendering, in Volume 54;
- Layered Identity Infrastructure Model for Identity Meta Systems, in Volume 81;
- Du, Wenliang - Building Decision Tree Classifier on Private Data, in Volume 14;
- Dubois, Eric - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
- Duckworth, William - Large k-Separated Matchings of Random Regular Graphs, in Volume 38;
- Duffert, Uwe - Frequency Space Representation of Transitions of Quadruped Robot Gaits, in Volume 26;
- Duignan, Matthew - Evaluating Scalable Vector Graphics for Use in Software Visualisation, in Volume 24;
- Visualising Reusable Software Over The Web, in Volume 9;
- Duke, David - Modular Techniques in Information Visualization, in Volume 9;
- Duke, Roger - A Reference Architecture for Instructional Educational Software, in Volume 46;
- Dukka, Bahadur K.C. - Protein Side-chain Packing Problem: A Maximum Edge-weight Clique Algorithmic Approach, in Volume 29;
- Dumas, M. - Patterns for e-service composition, in Volume 13;
- Product Flow Analysis in Distribution Networks with a Fixed Time Horizon, in Volume 74;
- Dumas, Marlon - A Programming Language for Web Service Development, in Volume 38;
- Synthesis of Orchestrators from Service Choreographies, in Volume 96;
- When are two Workflows the Same?, in Volume 41;
- Duncombe, David - Synapse: Auto-correlation and Dynamic Attack Redirection in an Immunologically-inspired IDS, in Volume 54;
- Dunn, Adam - Environment-Independent Performance Analyses of Cryptographic Algorithms, in Volume 16;
- Dunne, Lucy E. - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
- Duong, Maggie - An Integrated Access Control for Securely Querying and Updating XML Data, in Volume 75;
- LSDX: A New Labelling Scheme for Dynamically Updating XML Data, in Volume 39;
- Dwyer, Joanne - Computer Based Learning in NSW Primary Schools. Early Childhood v's Primary , in Volume 34;
- Dwyer, Tim - A Scalable Method for Visualising Changes in Portfolio Data, in Volume 24;
- Extending the WilmaScope 3D Graph Visualisation System - Software Demonstration, in Volume 45;
- Optimal Leaf Ordering for Two and a Half Dimensional Phylogenetic Tree Visualisation, in Volume 35;
- Representing Experimental Biological Data in Metabolic Networks, in Volume 29;
- Skeletal Animation for the Exploration of Graphs, in Volume 35;
- Three Dimensional UML Using Force Directed Layout, in Volume 9;
- Visual Analysis of Network Centralities, in Volume 60;
- Dyreson, Curtis - Approximate Retrieval of XML Data with ApproXPath, in Volume 75;
Top of ListE - Eades, Peter - A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization, in Volume 38;
- A System for Graph Clustering Based on User Hints, in Volume 2;
- Automatic Camera Path Generation for Graph Navigation in 3D, in Volume 45;
- Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters, in Volume 45;
- How People Read Graphs, in Volume 45;
- How People Read Sociograms: A Questionnaire Study, in Volume 60;
- MoneyTree: Ambient Information Visualization Of Financial Data, in Volume 36;
- Predicting Graph Reading Performance: A Cognitive Approach, in Volume 60;
- User Hints for Map Labelling, in Volume 16;
- Using MoneyColor to Represent Financial Data, in Volume 45;
- Using Spring Algorithms to Remove Node Overlapping, in Volume 45;
- Eales, R. T. Jim - A Knowledge Management Approach to User Support, in Volume 28;
- East, Philip - What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
- Eberl, Stefan - A Solution to the Distribution and Standarization of Multimedia Medical Data in E-Health, in Volume 11;
- Integrated Multimedia Medical Data Agent in E-Health, in Volume 11;
- Eckerdal, Anna - Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78;
- What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
- Edmond, David - Making Workflows Context-aware: A Way to Support Knowledge-intensive Tasks, in Volume 79;
- Edmonds, Ernest - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
- Edwards, Brett - Clustering and Classification of Maintenance Logs using Text Data Mining, in Volume 87;
- Edwards, C. B. H. - The Role of the Evaluator in Australian Defence Standard Def (Aust) 5679, in Volume 100;
- Edwards, Chris - Guidance for Def (Aust) 5679 Issue 2, in Volume 100;
- Edwards, Jenny - The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78;
- Towards understanding the non-technical work experiences of recent Australian information technology graduates, in Volume 78;
- Edwards, Sylvia L. - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
- Eeckhout, Lieven - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
- Egea, Kathy - Managing the managers: Collaborative virtual teams with large staff and student numbers, in Volume 20;
- Ehrig, Marc - Measuring Similarity between Semantic Business Process Models, in Volume 67;
- Eisman, Gerry - Approximate Recognition of Non-regular Languages by Finite Automata, in Volume 38;
- Eitrich, Tatjana - On The Optimal Working Set Size in Serial and Parallel Support Vector Machine Learning With The Decomposition Algorithm, in Volume 61;
- Ekins, Chris - Dealing with Geospatial Information in the Semantic Web, in Volume 58;
- El Gindy, Hossam - High-speed Parameterisable Hough Transform Using Reconfigurable Hardware, in Volume 11;
- Elci, Atilla - Enterprise Semantic Information Search System Based on New Music and Audio Ontology Integrating Existing Ontologies, in Volume 85;
- ElGindy, Hossam - On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm, in Volume 26;
- Ellims, Michael - On Wheels, Nuts and Software, in Volume 47;
- Elliott, Alison - Reflections and Directions: Transforming Early Childhood Pedagogies with Learning Technologies , in Volume 34;
- Elmasry, Amr - On the Power of Structural Violations in Priority Queues, in Volume 65;
- Elms, Kim - Internationalisation in the Web Services Domain, in Volume 32;
- Embley, David W. - Towards Semantic Understanding - An Approach Based on Information Extraction Ontologies, in Volume 27;
- Engel, Thomas - Acimn: A protocol for Anonymous Communication In Multi hop wireless networks, in Volume 81;
- Slotted Packet Counting Attacks on Anonymity Protocols, in Volume 98;
- Enkhsaikhan, Majigsuren - Measuring Data-Driven Ontology Changes using Text Mining, in Volume 70;
- Enticott, Colin - Optimizing Tunneled Grid Connectivity across Firewalls, in Volume 99;
- Epps, Julien - Visualisation of Reduced-Dimension Microarray Data Using Gaussian Mixture Models, in Volume 45;
- Eremin, Evgeny A. - Using topic map technology in the planning of courses from the CS knowledge domain, in Volume 88;
- Erkkola, Teemu - Fighting the student dropout rate with an incremental programming assignment, in Volume 88;
- Erlinger, Michael A. - TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
- Erlinger, Mike - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
- Ertl, T. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
- Erwin, Alva - A Bottom-Up Projection Based Algorithm for Mining High Utility Itemsets, in Volume 84;
- Eschner, Lisa - Event-based Communication for Location-based Service Collaboration, in Volume 92;
- Escott, Eban - Using Animations to Support the Teaching of General Computing Concepts, in Volume 30;
- Espinosa, Linda M. - Appropriation, Mastery and Resistance to Technology in Early Childhood Preservice Teacher Education: Case Studies, in Volume 34;
- Using Technology to Support the Learning and Social Development of Young Children , in Volume 34;
- Esser, Robert - Higher-Order Petri Net Modelling - Techniques and Applications, in Volume 12;
- Lightweight Consistency Analysis of Dataflow Process Networks, in Volume 16;
- Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking, in Volume 26;
- Estivill-Castro, Vladimir - A New Efficient Privacy-Preserving Scalar Product Protocol, in Volume 70;
- Computing Nash Equilibria Gets Harder: New Results Show Hardness Even for Parameterized Complexity, in Volume 94;
- Dogs or Robots - Why do Children See Them as Robotic Pets Rather Than Canine Machines?, in Volume 28;
- Mutually Visible Agents in a Discrete Environment, in Volume 62;
- Preface: Proceedings of the ICDM 2002 Workshop on Privacy, Security and Data Mining, in Volume 14;
- The Privacy of k-NN Retrieval for Horizontal Partitioned Data - New Methods and Applications, in Volume 63;
- Evans, Joanne - Automatically Generated Consumer Health Metadata Using Semantic Spaces, in Volume 80;
- Evered, Mark - A Case Study in Access Control Requirements for a Health Information System, in Volume 32;
- Bracket Capabilities for Distributed Systems Security, in Volume 4;
- Flexible Enterprise Access Control with Object-oriented View Specification, in Volume 21;
- Opsis - A Distributed Object Architecture Based on Bracket Capabilities, in Volume 10;
- Everts, Timothy J. - Using Formal Concept Analysis with an Incremental Knowledge Acquisition System for Web Document Management, in Volume 48;
Top of ListF - Fabre, John - Trust Requirements in Identity Management, in Volume 44;
- Fagin, Ronald - Finite Model Theory and its Origins, in Volume 96;
- Falkner, Katrina - A Domain Specific Language for Execution Profiling and Regulation, in Volume 91;
- Easing the Transition: A Collaborative Learning Approach, in Volume 95;
- Garbage Collection for Storage-Oriented Clusters, in Volume 26;
- Fallis, Don - Social Epistemology and the Digital Divide, in Volume 37;
- Fallon, Tony - Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
- Fan, Hongjian - A Bayesian Approach to Use Emerging Patterns for Classification, in Volume 17;
- Farago, Andras - Structural Properties of Random Graph Models, in Volume 94;
- Farias, Oscar L. M. - Applying Ontologies in the Integration of Heterogeneous Relational Databases, in Volume 58;
- Farinha, Jos - A Data Quality Metamodel Extension to CWM, in Volume 67;
- Farr, Graham - On pedagogically sound examples in public-key cryptography, in Volume 48;
- Faulconbridge, Ian - Unsupervised band removal leading to improved classification accuracy of hyperspectral images, in Volume 48;
- Faulkner, Stephane - Clarifying Goal Models, in Volume 83;
- Faulkner, Xristine - Open Ended Group Projects a 'Tool' for More Effective Teaching, in Volume 20;
- Fauvet, M.-C. - Patterns for e-service composition, in Volume 13;
- Feiner, Steven - On Beyond GUI, in Volume 64;
- Fekete, Alan - Learner Reflection in Student Self-assessment, in Volume 66;
- Transactions in Loosely Coupled Distributed Systems, in Volume 17;
- Using Counter-Examples in the Data Structures Course, in Volume 20;
- Feng, David D. - 3D Reconstruction of Single Picture, in Volume 36;
- A 3D Image Smoothing Method for Dynamic Functional Imaging, in Volume 2;
- A Simulation Study of Using ER Feedback Control to Transport Compressed Video over ATM Networks, in Volume 2;
- A Solution to the Distribution and Standarization of Multimedia Medical Data in E-Health, in Volume 11;
- A Statistical Method for Assessment of 3-D Medical Image Registration, in Volume 2;
- A Telemedicine System over Internet, in Volume 2;
- A Web Based Medical Image Data Processing and Management System, in Volume 2;
- A Web-based Collaborative System for Medical Image Analysis and Diagnosis, in Volume 2;
- Automatic Detection of PET Lesions, in Volume 22;
- Cataloging and Search Engine for Video Library, in Volume 2;
- Elastic Medical Image Registration Based on Image Intensity, in Volume 11;
- Face Recognition Using Multi-feature and Radial Basis Function Network, in Volume 22;
- Functional Segmentation of Dynamic Emission Tomographic images, in Volume 2;
- Integrated Multimedia Medical Data Agent in E-Health, in Volume 11;
- Molecular Imaging and Biomedical Process Modeling, in Volume 29;
- Non-Invasive estimation of Cerebral Metabolic Rate of Glucose Using Simultaneous Estimation and Cluster Analysis: A feasibility Study, in Volume 2;
- Novel Elastic Registration for 2-D Medical and Gel Protein Images, in Volume 19;
- Numerical Deconvolution by a Monte Carlo Approach with Application to Dynamic Cardiac Perfusion Tc-99m SPECT, in Volume 11;
- Optimal Selection of Image Segmentation Algorithms Based on Performance Prediction, in Volume 36;
- Segmentation-Based Multilayer Diagnosis Lossless Medical Image compression, in Volume 36;
- Variational Segmentation and PCA Applied to Dynamic PET Analysis, in Volume 22;
- Web-based Image Authentication Using Invisible Fragile Watermark, in Volume 11;
- Web-based Multimedia Collaboration System for Medical Images Analysis and Diagnosis, in Volume 22;
- Fenn, Jane - A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments, in Volume 33;
- Fenwick, Joel - Mutually Visible Agents in a Discrete Environment, in Volume 62;
- Fergusson, David - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54;
- Ferizis, George - On Improving the Memory Access Patterns During The Execution of Strassen's Matrix Multiplication Algorithm, in Volume 26;
- Fernandes de Macedo, Jose Antonio - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83;
- Fernandez, George - CONFER: Towards Groupware for Building Consensus in Collaborative Software Engineering, in Volume 64;
- Ferrarotti, Flavio A. - On the Computation of Approximations of Database Queries, in Volume 27;
- Ferreira, Jennifer - A Case for Iconic Icons, in Volume 50;
- The Semiotics of User Interface Redesign, in Volume 40;
- Ferreira, Joelma de Moura - Interactive Optimization in Cooperative Environments, in Volume 60;
- Fetherston, T. - A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies, in Volume 38;
- Fetherston, Tony - What Information and Communication Technologies Courses Should Be Taught at a New Senior College?, in Volume 8;
- Fiddian, N.J. - Establishing an XML Metadata Knowledge Base to Assist Integration of Structured and Semi-structured Databases, in Volume 49;
- Fidge, C. J. - Product Flow Analysis in Distribution Networks with a Fixed Time Horizon, in Volume 74;
- Fidge, Colin - Cross-Layer Verification of Type Flaw Attacks on Security Protocols, in Volume 62;
- Losing Their Marbles: Syntax-Free Programming for Assessing Problem-Solving Skills, in Volume 95;
- On the efficacy of prerecorded lectures for teaching introductory programming, in Volume 78;
- Relative Simulation and Model Checking of Real-Time Processes, in Volume 74;
- Tracing Information Flow Through Mode Changes, in Volume 48;
- Fiedler, Gunar - Database Collaboration Instead of Integration, in Volume 43;
- Field, Tony - Optimising Parallel Pattern-matching by Source-level Program Transformation, in Volume 38;
- Fife, Leslie - Simple Eight Bit, Emulated Computers for Illustrating Computer Architecture Concepts and Providing a Starting Point for Student Designs, in Volume 66;
- Figueroa, Alejandro - Mining Web Snippets to Answer List Questions, in Volume 84;
- Figueroa, Andres - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
- Filho, Jugurta Lisboa - Improving Productivity and Quality of GIS Databases Design using an Analysis Pattern Catalog, in Volume 43;
- Filsell, Jenny - Researching Pedagogy and Teaching Methodologies that Transform Student Learning in South Australian Classrooms, in Volume 8;
- Fincher, Sally - Multi-Institutional Teaching Communities in Computer Education, in Volume 52;
- Predictors of success in a first programming course, in Volume 52;
- The ability to articulate strategy as a predictor of programming skill, in Volume 52;
- Finegan, Andrew - Information Technology Online: A Knowledge Framework for Curriculum Externalisation, in Volume 52;
- Fink, J. L. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
- Finkel, Raphael A. - Signature Extraction for Overlap Detection in Documents, in Volume 4;
- Fischer, Ronald - Persuasive Interaction for Collectivist Cultures, in Volume 50;
- Fischmeister, Sebastian - MUSA-Shadow: Concepts, Implementation and Sample Applications - A Location-Based Service Supporting Multiple Devices, in Volume 10;
- Fisher, Damien K. - Dynamic Labeling Schemes for Ordered XML Based on Type Information, in Volume 49;
- Querying and Maintaining Ordered XML Data using Relational Databases, in Volume 39;
- Fisher, Tony - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
- Fishkin, Aleksei V. - On Packing Squares with Resource Augmentation: Maximizing the Profit, in Volume 41;
- Fitzgerald, Brian - Defining Security Services for Electronic Tendering, in Volume 32;
- Fitzpatrick, Geraldine - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
- Flake, Stephan - Towards the Completion of the Formal Semantics of OCL 2.0, in Volume 26;
- Fleurke, Martin - Monitoring and Controlling of a Multi-agent Based Workflow System, in Volume 32;
- Flint, Shayne - Executable/Translatable UML in Computing Education, in Volume 30;
- Floridi, Luciano - Informational Realism, in Volume 37;
- Fluck, Andrew - A Systems Approach to ICT in School Education , in Volume 34;
- Why Isn't ICT as Effective as it Ought To Be in School Education?, in Volume 23;
- Foo, Ernest - Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets, in Volume 62;
- Defining Security Services for Electronic Tendering, in Volume 32;
- Formal Analysis of Secure Contracting Protocol for E-Tendering, in Volume 54;
- Layered Identity Infrastructure Model for Identity Meta Systems, in Volume 81;
- Secure Data Aggregation in Wireless Sensor Network: a survey, in Volume 81;
- Visually Sealed and Digitally Signed Documents, in Volume 26;
- Foo, Jun Jie - Pruning SIFT for Scalable Near-duplicate Image Matching, in Volume 63;
- Fookes, Clinton - Assessing Viewing Pattern Consistency in Mammogram Readers, in Volume 97;
- Foote, Brian - Attack of the Clones, in Volume 13;
- Foster, Ian - Computing Outside the Box, in Volume 91;
- Computing Outside the Box, in Volume 99;
- Foulger, Cameron - Data Flow and Validation in Workflow Modelling, in Volume 27;
- Fourmentin, Eric - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
- Francis, Lishoy - Countermeasures for Attacks on Satellite TV Cards using Open Receivers, in Volume 44;
- Franco, Luis - Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98;
- Security Enhanced Linux to Enforce Mandatory Access Control in Health Information Systems, in Volume 80;
- Fraser, R. - Service Oriented Grid Architecture for Geosciences Community, in Volume 68;
- Frasincar, Flavius - XAL: An Algebra For XML Query Optimization, in Volume 5;
- Frattolillo, Franco - Applying Web Oriented Technologies to Implement an Adaptive Spread Spectrum Watermarking Procedure and a Flexible DRM Platform, in Volume 44;
- Freeman, Darren - Hardware Acceleration of JPEG2000 Image Compression for Low-Power Embedded Applications, in Volume 16;
- Freeman, Isaac J. - Connector Semantics for Sketched Diagram Recognition, in Volume 64;
- Freischlad, Stefan - Exploration module for understanding the functionality of the internet in secondary education, in Volume 88;
- Frew, Zelda - Similarity and originality in code: plagiarism and normal variation in student assignments, in Volume 52;
- Friedrich, Carsten - Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size, in Volume 26;
- Visualisation of Satisfiability using the Logic Engine, in Volume 45;
- Friese, Thomas - Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids, in Volume 82;
- Frikken, Keith - Remote Revocation of Smart Cards in a Private DRM System, in Volume 44;
- Frost, Laura - On pedagogically sound examples in public-key cryptography, in Volume 48;
- Fu, Alan M.N. - A Hierarchical Approach in Multilevel Thresholding Based on Maximum Entropy and Bayes' Formula, in Volume 11;
- Comparison of Five Conditional Probabilities in 2-Level Image Threshold Based on Bayesian Formulation, in Volume 2;
- Fu, Jung-Sheng - Pancycles and Hamiltonian-Connectedness of the Hierarchical Cubic Network, in Volume 6;
- Fu, Xiaoyan - Haptic Shoes: Representing Information By Vibration, in Volume 45;
- Fuad, Mohammed M. - AdJava - Automatic Distribution of Java Applications, in Volume 4;
- Fuericht, Reinhard - A Component-Based Application Framework for Manufacturing Execution Systems in C# and .NET, in Volume 10;
- Fuh, Gene Y. C. - Aggregate Predicate Support in DBMS, in Volume 5;
- Fujita, Hitoshi - Minimum Cost Source Location Problem with Local 3-Vertex-Connectivity Requirements, in Volume 41;
- Fukazawa, Yoshiaki - Dynamic Hierarchical Undo Facility in a Fine-Grained Component Environment, in Volume 10;
- Fukuda, Ken Ichiro - A Pathway Editor for Literature-based Knowledge Curation, in Volume 29;
- Fukuhara, Hideaki - Lower Bounds on Quantum Query Complexity for Read-Once Decision Trees with Parity Nodes, in Volume 94;
- Fukushima, Yuji - An XML Document Transformation Algorithm Inferred from an Edit Script between DTDs, in Volume 75;
- Fule, Peter - Detecting Privacy and Ethical Sensitivity in Data Mining Results, in Volume 26;
- Experiences in Building a Tool for Navigating Association Rule Result Sets, in Volume 32;
- SemGrAM - Integrating Semantic Graphs into Association Rule Mining, in Volume 70;
- Fulga, Florin - A New Program to Compute the Surface Properties of Biomolecules, in Volume 19;
- Fulham, Michael J. - Functional Segmentation of Dynamic Emission Tomographic images, in Volume 2;
- Non-Invasive estimation of Cerebral Metabolic Rate of Glucose Using Simultaneous Estimation and Cluster Analysis: A feasibility Study, in Volume 2;
- Numerical Deconvolution by a Monte Carlo Approach with Application to Dynamic Cardiac Perfusion Tc-99m SPECT, in Volume 11;
- Fuller, Ursula - Facilitating Global Computing Education Through Study Abroad and Collaborative Projects, in Volume 52;
- Should we assess our students' attitudes?, in Volume 88;
- Fulton, Roger - A 3D Image Smoothing Method for Dynamic Functional Imaging, in Volume 2;
- Fung, Peggy - Electronic Information Security Documentation, in Volume 21;
- Furness III, Thomas A. - A Quest For The Ultimate Interface, in Volume 50;
- Furuse, Kazutaka - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
- Fusenig, Volker - Acimn: A protocol for Anonymous Communication In Multi hop wireless networks, in Volume 81;
- Slotted Packet Counting Attacks on Anonymity Protocols, in Volume 98;
- Fuster-Sabater, Amparo - Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences, in Volume 81;
Top of ListG - G, Sridhar - Identifying Stock Similarity Based on Multi-event Episodes, in Volume 87;
- Gaber, Mohamed Medhat - Cost-Efficient Mining Techniques for Data Streams, in Volume 32;
- Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks, in Volume 75;
- Gaeta, Bruno - Learning Causal Networks from Microarray Data, in Volume 73;
- Gaikwad, Rekha - Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
- Gal, Andreas - AspectC++: An Aspect-Oriented Extension to the C++ Programming Language, in Volume 10;
- Galang, Gerson - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
- Gallagher, Marcus - Higher Order HMMs for Localization Prediction of Transmembrane Proteins, in Volume 73;
- Gallasch, Guy - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12;
- Galloway, John - Network Data Mining: Methods and Techniques for Discovering Deep Linkage between Attributes, in Volume 53;
- Selected Tacit Knowledge Observations Within Two Organisations, in Volume 22;
- Ganguly, Pronab - Bridging Semantic Gap, in Volume 13;
- Ganguly, Sumit - Distributing Frequency-Dependent Data Stream Computations, in Volume 94;
- Gani, Hendrik - Improving the Transparency of Proxy Injection in Java, in Volume 91;
- Gao, Junbin - A Discriminant Analysis for Undersampled Data, in Volume 84;
- A Multi-step Strategy for Approximate Similarity Search in Image Databases, in Volume 49;
- Gao, Peng - A Linear Time Algorithm for Pricing European Sequential Barrier Options, in Volume 65;
- Gao, Wenying Wendy - Multimedia Index and Retrieval Under MARC Framework, in Volume 22;
- Garcia-Remesal, Miguel - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
- Garcia, Steven - Access-Ordered Indexes, in Volume 26;
- Gardner, Henry - eScience Curricula at Two Australian Universities, in Volume 42;
- Executable/Translatable UML in Computing Education, in Volume 30;
- Line Drawing in Virtual Reality using a Game Pad, in Volume 50;
- Garg, Saurabh Kumar - Scheduling Parallel Applications on Utility Grids: Time and Cost Trade-off Management, in Volume 91;
- Garlan, David - Architecture-driven Modelling and Analysis, in Volume 69;
- Garner, Sandy - My Program is Correct But it Doesn't Run: A Preliminary Investigation of Novice Programmers' Problems, in Volume 42;
- Problem Distributions in a CS1 Course, in Volume 52;
- Gartner, J. U. - Certified Software Factory: Open Software Toolsuites, Safe Methodologies and System Architectures, in Volume 69;
- Gascuel, Jean-D. - Interactive Mediated Reality, in Volume 40;
- Gaudiot, Jean-Luc - Alias Analysis for Exceptions in Java, in Volume 4;
- Gawler, Mark - Predictive Model of Insolvency Risk for Australian Corporations, in Volume 70;
- Gayler, Ross - Adaptive Spike Detection for Resilient Data Stream Mining, in Volume 70;
- Towards Scalable Real-Time Entity Resolution using a Similarity-Aware Inverted Index Approach, in Volume 87;
- Ge, Esther - Data Mining For Lifetime Prediction of Metallic Components, in Volume 61;
- Gebauer, Heidi - Fast Exponential-Time Algorithms for the Forest Counting in Graph Classes, in Volume 65;
- Geldof, Sabine - CORAL : Using Natural Language Generation for Navigational Assistance, in Volume 16;
- Geoghegan, Sean - Dealing with Geospatial Information in the Semantic Web, in Volume 58;
- Georgakopoulos, Dimitrios - Engineering Agile Systems, in Volume 92;
- George, Susan E. - Learning and the Reflective Journal in Computer Science, in Volume 4;
- Gerber, Olga - On Packing Squares with Resource Augmentation: Maximizing the Profit, in Volume 41;
- Gerson, Andrea - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
- Getta, Janusz - Conceptual Modelling of Computations On Data Streams, in Volume 43;
- Geva, Shlomo - News Aware Volatility Forecasting: Is the Content of News Important?, in Volume 70;
- What Types of Events Provide the Strongest Evidence that the Stock Market is Affected by Company Specific News?, in Volume 61;
- Ghandar, Adam - Pattern Puzzle: A Metaphor for Visualizing Software Complexity Measures, in Volume 60;
- Ghani, Neil - Constructing Strictly Positive Families, in Volume 65;
- Ghatti, Venkat Ram - Identifying Character Non-Independence in Phylogenetic Data Using Data Mining Techniques, in Volume 29;
- Ghose, Aditya - Model Eco-Systems: Preliminary Work, in Volume 79;
- Ghose, Aditya K. - Business Process Integration: Method and Analysis, in Volume 96;
- CASO: A Framework for dealing with objectives in a constraint-based extension to AgentSpeak(L), in Volume 48;
- Ghosh, Ranadhir - A Semantic Approach to Boost Passage Retrieval Effectiveness for Question Answering, in Volume 48;
- Applying Anatomical Therapeutic Chemical (ATC) and Critical Term Ontologies to Australian Drug Safety Data for Association Rules and Adverse Event Signalling, in Volume 58;
- Ghous, Hamid - Kernel-based Visualisation of Genes with the Gene Ontology, in Volume 87;
- Giannakos, Aristotelis - Greedy algorithms for on-line set-covering and related problems, in Volume 51;
- Gibbs, Donna - A Jump-start in Learning? Young Children's Use of CDRom Technology, in Volume 34;
- Gibbs, Tanton H. - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
- Gibson, J. Paul - Automated Assessment in CS1, in Volume 52;
- Gil, Pedro - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
- Gilbert, David - An Empirical Comparison of Supervised Machine Learning Techniques in Bioinformatics, in Volume 19;
- Gill, Rupinder - Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks, in Volume 54;
- Gilmour, Stephen - A Two-Pronged Attack on the Dragon of Intractability, in Volume 38;
- Gipps, John - Data Logging and Inquiry Learning in Science, in Volume 8;
- Glynn, Erica - Integration of generic program analysis tools into a software development environment, in Volume 38;
- Go, Nobuhiro - Toward Building Grid Applications in Bioinformatics, in Volume 54;
- Gockelmann, R. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
- Godat, Meredith - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42;
- Godfrey, Bob - Electronic Work Monitoring: An Ethical Model, in Volume 1;
- Godinet, Helene - Distant Actors On a Digital Campus, or Sharing and Crumbling Pedagogical Responsibility, in Volume 23;
- Goecke, Roland - Audio-Video Automatic Speech Recognition: An Example of Improved Performance through Multimodal Sensor Input, in Volume 57;
- Learning Active Appearance Models from Image Sequences, in Volume 56;
- Goedecke, David - The Role of the Software Practitioner in the Development of Public Safety Software-intensive Systems, in Volume 86;
- Goeman, Bart - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
- Goh, Liang - A Novel Feature Selection Method to Improve Classification of Gene Expression Data, in Volume 29;
- Goiser, Karl - Towards Automated Record Linkage, in Volume 61;
- Goldman, Debora - Reality Bytes : A Reflection of the Perception Versus The Reality of Teaching with ICT, in Volume 23;
- Goldman, Grigori - Periodical Payment Model Using Restricted Proxy Certificates, in Volume 62;
- Goldson, Doug - Concurrent Program Design in the Extended Theory of Owicki and Gries, in Volume 41;
- Goldstein, Avraham - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
- Goldstein, Cecil - Using a Network Simulation Tool to Engage Students in Active Learning Enhances Their Understanding of Complex Data Communications Concepts., in Volume 42;
- Goldweber, Michael - A Comparison of Different Approaches to the Introductory Programming Course, in Volume 52;
- Gollmann, Dieter - A Method for Access Authorisation Through Delegation Networks, in Volume 54;
- Golob, Izidor - Early Assessment of Classification Performance, in Volume 32;
- Gomes, Pedro - A Data Quality Metamodel Extension to CWM, in Volume 67;
- Gomez, Sergio Alejandro - An Argumentative Approach to Reasoning with Inconsistent Ontologies, in Volume 90;
- Gong, Xiujun - Toward Building Grid Applications in Bioinformatics, in Volume 54;
- Gonsalves, Atish - The Effect of Context and Application Type on Mobile Usability: An Empirical Study, in Volume 38;
- Gonzalez Nieto, Juan Manuel - Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets, in Volume 62;
- ID-based One-pass Authenticated Key Establishment, in Volume 81;
- Secure Data Aggregation in Wireless Sensor Network: a survey, in Volume 81;
- Gonzalez-Nieto, Juan Manuel - SKMA - A Key Management Architecture for SCADA Systems, in Volume 54;
- Gonzalez-Nieto, Juan Manuel - Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework, in Volume 54;
- Gonzalez-Perez, Cesar - The Rationale of Powertype-based Metamodelling to Underpin Software Development Methodologies, in Volume 43;
- Goodburn, Daniel - Rapid Assembly and Deployment of Domain Visualisation Solutions, in Volume 9;
- Goodchild, Andrew - UML and XML Schema, in Volume 5;
- Goode, Matthew - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29;
- Goodwin, Robert - Flexible Learning - Maximising Flexibility in a Subject with Large Student Numbers, in Volume 30;
- Goodwin, Scott D. - Code Improvements for Model Elimination Based Reasoning Systems, in Volume 26;
- Improving Search in a Hypothetical Reasoning System, in Volume 16;
- Goold, Annegret - Facilitating Global Computing Education Through Study Abroad and Collaborative Projects, in Volume 52;
- Gopalan, Raj P. - A Bottom-Up Projection Based Algorithm for Mining High Utility Itemsets, in Volume 84;
- CT-ITL : Efficient Frequent Item Set Mining Using a Compressed Prefix Tree with Pattern Growth, in Volume 17;
- Gor, Ajay S. - Optimal Joint Vendor-Buyer Inventory Strategy for Deteriorating Items with Salvage Value, in Volume 77;
- Gorantla, M. Choudary - ID-based One-pass Authenticated Key Establishment, in Volume 81;
- Strong Designated Verifier Signature in a Multi-user Setting, in Volume 98;
- Gordon, Donald - Clicki: A Framework for Light-weight Web-based Visual Applications, in Volume 40;
- Gore, Rajeev - Termination of Abstract Reduction Systems, in Volume 65;
- Gorman, Malcolm - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26;
- Gorton, Ian - Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
- Goscinski, Andrzej - Autonomic System Management in Mobile Grid Environments, in Volume 68;
- Service Migration in Autonomic Service Oriented Grids, in Volume 82;
- State Aware WSDL, in Volume 82;
- Gotterbarn, Don - Using SoDIS as a Risk Analysis Process: A Teaching Perspective, in Volume 30;
- Gough, John - Compiling Ruby on the CLR, in Volume 74;
- Governatori, Guido - A Model of Dynamic Resource Allocation in Workflow Systems, in Volume 27;
- An algorithm for the induction of defeasible logic theories from databases, in Volume 17;
- An Optimization for Query Answering on ALC Database, in Volume 49;
- Handling of Current Time in Native XML Databases, in Volume 49;
- Process Modelling: The Deontic Way, in Volume 53;
- Representing and Reasoning on XForms Document, in Volume 27;
- Using a Temporal Constraint Network for Business Process Execution, in Volume 49;
- Goyette, Shea - Visualising Internet Traffic Data with Three-Dimensional Spherical Display, in Volume 45;
- Graham, Hamish - A Solar System Metaphor for 3D Visualisation of Object Oriented Software Metrics, in Volume 35;
- Graham, Malcolm - Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models, in Volume 16;
- Graham, Stephen C. - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19;
- Grainger, Ryan - Organisational Factors Affecting Teachers' Use and Perception of Information & Communications Technology, in Volume 46;
- Grandell, Linda - Why Complicate Things? Introducing Programming in High School Using Python, in Volume 52;
- Grannis, Shaun J. - Privacy-Preserving Distributed Queries for a Clinical Case Research Network, in Volume 14;
- Grante, Christian - A Method and Tool Support for Model-based Semi-automated Failure Modes and Effects Analysis of Engineering Designs, in Volume 47;
- Grasset, Raphael - Interactive Mediated Reality, in Volume 40;
- Gray, Pamela N. - Intellectual Artefacts of Expert Systems Meta-epistemology, in Volume 37;
- Gray, W.A. - Establishing an XML Metadata Knowledge Base to Assist Integration of Structured and Semi-structured Databases, in Volume 49;
- Graydon, Patrick J. - Engineering, Communication, and Safety, in Volume 86;
- Gready, Jill E. - Pathway to Functional Studies: Pipeline Linking Phylogenetic Footprinting and Transcription-Factor Binding Analysis, in Volume 73;
- Greber, Myles - This Course Has A Bloom Rating Of 3.9, in Volume 30;
- Green, Richard - Evaluating Swiftpoint as a Mobile Device for Direct Manipulation Input, in Volume 64;
- Greenberg, Saul - Display and Presence Disparity in Mixed Presence Groupware, in Volume 28;
- Enhancing Creativity with (Groupware) Toolkits, in Volume 28;
- Rapidly Prototyping Single Display Groupware through the SDGToolkit, in Volume 28;
- Greenfield, Paul - Transactions in Loosely Coupled Distributed Systems, in Volume 17;
- Greening, Tony - Integrating Ethical Content Into Computing Curricula, in Volume 30;
- Gregersen, Heidi - The Formal Semantics of the TimeER Model, in Volume 53;
- Grenon, Pierre - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
- Gribble, Susan J. - Engaging Undergraduates in Discussions about Ethics in Computing, in Volume 66;
- The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
- Grieshaber, Susan - New Basics Pedagogies that Promote Multiliteracies , in Volume 34;
- Teachers Rethinking Curriculum Approaches within a New Basics Framework , in Volume 34;
- Griffiths, Alena - A Product-Based Assurance Model for Mixed-Integrity Markets, in Volume 15;
- Guidance for Def (Aust) 5679 Issue 2, in Volume 100;
- On proof-test intervals for safety functions implemented in software, in Volume 69;
- Systems Assurance for the Integrated Control and Communications System for KCRC East Rail Extensions, in Volume 15;
- Grigg, Mark - Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom, in Volume 21;
- Grimsmo, Nils - Faster Path Indexes for Search in XML Data, in Volume 75;
- Gromiha, Michael M. - Structure-Function Relationship in DNA Sequence Recognition by Transcription Factors, in Volume 29;
- Grossmann, Georg - Exploiting Semantics of Inter-Process Dependencies to Instantiate Predefined Integration Patterns, in Volume 83;
- Modelling Inter-Process Dependencies with High-Level Business Process Modelling Languages, in Volume 79;
- On the Road to Behavior-Based Integration, in Volume 31;
- Grove, Duncan - PULSE: a Pluggable User-space Linux Security Environment paper, in Volume 81;
- Grove, Duncan A. - Communication Performance Issues for Two Cluster Computers, in Volume 16;
- Groves, Lindsay - Verifying Michael and Scott's Lock-Free Queue Algorithm using Trace Reduction, in Volume 77;
- Gruba, Paul - Making Connections: First Year Transition for Computer Science and Software Engineering Students, in Volume 42;
- Strategies for Communication Skills Development, in Volume 30;
- What Drives Curriculum Change?, in Volume 30;
- Gruhn, Volker - Development of an Electronic Commerce Portal System using a Specific Software Development Process, in Volume 10;
- Grun, Katharina - Multi-Level Domain Modeling with M-Objects and M-Relationships, in Volume 96;
- Grundeman, Peter - Extending a Persistent Object Framework to Enhance Enterprise Application Server Performance, in Volume 5;
- Grundy, John - A Visual Language and Environment for Specifying User Interface Event Handling in Design Tools, in Volume 64;
- An environment for developing adaptive, multi-device user interfaces, in Volume 18;
- Beautifying Sketching-based Design Tool Content: Issues and Experiences, in Volume 40;
- Building Multi-Device, Component-based, Thin-client Groupware: Issues and Experiences, in Volume 7;
- Design Pattern Modelling and Instantiation using DPML, in Volume 10;
- Extending a Persistent Object Framework to Enhance Enterprise Application Server Performance, in Volume 5;
- Generating mobile device user interfaces for diagram-based modelling tools, in Volume 50;
- Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
- Gu, Zhixiong - A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters, in Volume 44;
- Gudmundsson, Joachim - An ILP for the metro-line crossing problem, in Volume 77;
- Increasing the Readability of Graph Drawings with Centrality-Based Scaling, in Volume 60;
- Guillaume, Sylvie - Visualization of Attractive and Repulsive Zones Between Variables, in Volume 61;
- Gunes, Hatice - Face and Body Gesture Recognition for a Vision-Based Multimodal Analyzer, in Volume 36;
- Observer Annotation of Affective Display and Evaluation of Expressivity: Face vs. Face-and-Body, in Volume 56;
- Gunji, Yukio-Pegio - Observational Heterarchy as Phenomenal Computing, in Volume 37;
- Gunstone, Dick - An Exploration of Internal Factors Influencing Student Learning of Programming, in Volume 95;
- Gunther, Oliver - Privacy Conflicts in CRM Services for Online Shops: A Case Study, in Volume 14;
- Guo, Jian - A Novel Method for Protein Subcellular Localization Based on Boosting and Probabilistic Neural Network, in Volume 29;
- Guo, Zhijuan - SPECT Image Data Compression Using Optimal Sampling Schedule, in Volume 22;
- Gupta, Arvind - Minimum Cost Homomorphism to Oriented Cycles with Some Loops, in Volume 94;
- Gurd, Bruce - GP Attitudes towards Using HI Systems in Their Professional Role, in Volume 97;
- Gurrutxaga, Ibai - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87;
- Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
- Guzdial, Mark - Contextualized Computing Education of Programming, in Volume 95;
- Gwynne, David - Grid services for e-archaeology, in Volume 82;
Top of ListH - Haaksma-Oostijen, T.G. - ICT and the New Roles of the Teacher in Dutch Secondary Education, in Volume 23;
- Haden, Patricia - My Program is Correct But it Doesn't Run: A Preliminary Investigation of Novice Programmers' Problems, in Volume 42;
- Parson's Programming Puzzles: A Fun and Effective Learning Tool for First Programming Courses, in Volume 52;
- Problem Distributions in a CS1 Course, in Volume 52;
- The ability to articulate strategy as a predictor of programming skill, in Volume 52;
- The Incredible Rainbow Spitting Chicken: Teaching Traditional Programming Skills Through Games Programming, in Volume 52;
- Hadzic, Maja - Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling, in Volume 79;
- Haeusler, Edward Hermann - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
- Semantic Interoperability via Category Theory, in Volume 83;
- Hafen, Gaudenz - A Classification Algorithm that Derives Weighted Sum Scores for Insight into Disease, in Volume 97;
- Hafenrichter, Bernd - Optimization of Relational Preference Queries, in Volume 39;
- Hagan, Dianne - Employer Satisfaction with ICT graduates, in Volume 30;
- Hagemann, Stephan - ActiveTags: Making Tags More Useful Anywhere on the Web, in Volume 92;
- Hagen, Richard A. - Code Improvements for Model Elimination Based Reasoning Systems, in Volume 26;
- Improving Search in a Hypothetical Reasoning System, in Volume 16;
- Hagenbuchner, Markus - A ConceptLink Graph for Text Structure Mining, in Volume 91;
- Hagenus, Kim - Adaptive Learning Environments for CS Education : From AMLE to Live Spaces, in Volume 20;
- Haggard, Gary - Edge-Selection Heuristics for Computing Tutte Polynomials, in Volume 94;
- Haider, Sajjad - Synthesizing Executable Models of Object Oriented Architectures, in Volume 12;
- Hajmoosaei, Abdolreza - An ontology-based approach for resolving semantic schema conflicts in the extraction and integration of query-based information from heterogeneous web data sources, in Volume 85;
- Halabi, Abdel K. - Designing Better CBL than Face-to-Face Tutoring by Incorporating Teacher-like Feedback and Guidance in Accounting, in Volume 8;
- Hale, Allison - Teachers Rethinking Curriculum Approaches within a New Basics Framework , in Volume 34;
- Haley, David - Calculating Train Braking Distance, in Volume 3;
- Haley, Debra T. - Measuring Improvement in Latent Semantic Analysis-Based Marking Systems: Using a Computer to Mark Questions about HTML, in Volume 66;
- Halim, Farris J. - View Synthesis by Image Mapping and Interpolation, in Volume 11;
- Hall, R. - A Rapid Method of Whole Genome Visualisation Illustrating Features in Both Coding and Non-coding Regions, in Volume 29;
- Hall, Robin - Learning and Online Knowledge Use, in Volume 8;
- Hallinan, Jennifer - Evolving Genetic Regulatory Networks Using an Artificial Genome, in Volume 29;
- Hamadi, Rachid - A Petri Net-based Model for Web Service Composition, in Volume 17;
- Dynamic Restructuring of Recovery Nets, in Volume 39;
- Hamer, John - A Maturity Model for Computing Education, in Volume 66;
- A Method of Automatic Grade Calibration in Peer Assessment, in Volume 42;
- Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52;
- Peer Assessment Using Aropa, in Volume 66;
- The PeerWise system of student contributed assessment questions, in Volume 78;
- Visualising Java Data Structures as Graphs, in Volume 30;
- Hamey, Leonard G.C. - Teaching Secure Data Communications Using a Game Representation, in Volume 20;
- Hamidjadja, Herry - A CORBA Cooperative Cache Approach with Popularity Admission and Routing Mechanism, in Volume 5;
- Hamilton, Margaret - A Taxonomic Study of Novice Programming Summative Assessment, in Volume 95;
- Experiences in Teaching Computing Theory via Aspects of Problem-based Learning, in Volume 20;
- Learning about Software Development - Should Programming Always Come First?, in Volume 30;
- Mobile Computing, Programming, Games and Online Communities: Changes to the Communicative Ecology of Design Students Through Mobile Computing: Part 2, in Volume 66;
- Mobile Computing, Visual Diaries, Learning and Communication: Changes to the Communicative Ecology of Design Students Through Mobile Computing, in Volume 52;
- Software Development Marketplaces - Implications for Plagiarism, in Volume 66;
- Transforming learning of programming: a mentoring project, in Volume 78;
- Hamilton, N. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
- Hamilton, Viv - A New Concept in Defence Safety Standards: The Revised UK Defence Standard 00-56, in Volume 55;
- Hamoy, Christian - HazLog: Tool Support for Hazard Management, in Volume 47;
- Han, Bing - Closed Form Expressions for the State Space of TCP's Data Transfer Service Operating over Unbounded Channels, in Volume 26;
- On Defining the Service Provided by TCP, in Volume 16;
- Validating TCP Connection Management, in Volume 12;
- Han, Christina C.W. - Challenges of Using ICT in Hong Kong Early Childhood Settings, in Volume 34;
- Han, Seungchul - Schemes of Storing XML Query Cache, in Volume 39;
- Hannah, Robert - Observations of Student Competency in a CS1 Course, in Volume 42;
- Hansaki, Tomoyuki - FindFlow: Visual Interface for Information Search based on Intermediate Results, in Volume 60;
- Hansen, Klaus Marius - Dynamic Design and Evaluation of Software Architecture in Critical Systems Development, in Volume 69;
- Hanson, K. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
- Hao, Guoshun - An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries, in Volume 83;
- Hao, Yanan - A Two-Phase Rule Generation and Optimization Approach for Wrapper Generation, in Volume 49;
- Web Services Discovery Based On Schema Matching, in Volume 62;
- Hara, Takahiro - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
- Harder, Uli - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
- Hardt, Marcus - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54;
- Hardy, Dianna L. - YourSRB: A cross platform interface for SRB and Digital Libraries, in Volume 68;
- Harfield, Anthony - Contextualising information and communications technology in developing countries, in Volume 88;
- Haris, Parvez I. - Empirical Knowledge and Genetic Algorithms for Selection of Amide I Frequencies in Protein Secondary Structure Prediction, in Volume 29;
- Harland, James - Analysis of Busy Beaver Machines via Induction Proofs, in Volume 65;
- Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids, in Volume 4;
- Evaluating the dynamic behaviour of Python applications, in Volume 91;
- Experiences in Teaching Computing Theory via Aspects of Problem-based Learning, in Volume 20;
- Planning with Time Limits in BDI Agent Programming Languages, in Volume 65;
- Representation and Reasoning for Goals in BDI Agents, in Volume 4;
- The Busy Beaver, the Placid Platypus and other Crazy Creatures, in Volume 51;
- Transforming learning of programming: a mentoring project, in Volume 78;
- Harper, Barry - Constructing High Quality Learning Settings, in Volume 42;
- Harris, Eric - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
- Harris, Michael C. - Software Development Marketplaces - Implications for Plagiarism, in Volume 66;
- Harris, Pauline - Child's Play: Computer Games, Theories of Play and Children's Development, in Volume 34;
- Harrison, Cathie - The Introduction of New Technologies - New Possibilities, Partnerships and Power Relationships , in Volume 34;
- Hartel, Rita - CSC: Supporting Queries on Compressed Cached XML, in Volume 92;
- Hartmann, Sven - Constraint Acquisition - You Can Chase but You Cannot Find, in Volume 79;
- English Sentence Structures and EER Modeling, in Volume 67;
- Horn Clauses and Functional Dependencies in Complex-value Databases, in Volume 49;
- Normalisation in the Presence of Lists, in Volume 27;
- On Inferences of Full Hierarchical Dependencies, in Volume 62;
- Reasoning about participation constraints and Chen's constraints, in Volume 17;
- Hartnell-Young, Elizabeth - From Facilitator to Knowledge-Builder : A New Role for the Teacher of the Future, in Volume 23;
- Hartnett, Jacky - An online tool for learning collaboration and learning while collaborating., in Volume 52;
- Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists, in Volume 54;
- Hasan, Syed - Supporting Large Scale eResearch Infrastructures with Adapted Live Streaming Capabilities, in Volume 82;
- Hasegawa, Ryo - Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling, in Volume 96;
- Hashemi-Sakhtsari, Ahmad - Speech-to-Text Transcription in Support of Pervasive Computing, in Volume 25;
- Hashimoto, S. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
- Hasunuma, Toro - Multilayer Grid Embeddings of Iterated Line Digraphs, in Volume 51;
- Hathaway, Richard J. - Approximate Data Mining in Very Large Relational Data, in Volume 49;
- Hauer, Amie - A learning theory perspective on running open ended group projects (OEGPs), in Volume 78;
- Haugvaldstad, Erik - Moving animation script creation from textual to visual representation, in Volume 50;
- Hausser, Roland - Modeling Natural Language Communication in Database Semantics, in Volume 96;
- Haverkorty, Herman - Computing a Minimum-Dilation Spanning Tree is NP-hard, in Volume 65;
- Hawick, K.A. - Bootstrapping Computer Science in Old North Wales, in Volume 20;
- Middleware for Context Sensitive Mobile Applications, in Volume 21;
- Teaching Students How to be Computer Scientists Through Student Projects, in Volume 42;
- Hawick, K.A. - Simulating a Computational Grid with Networked Animat Agents, in Volume 54;
- Hawick, Ken A. - A Small-World Network Model for Distributed Storage of Semantic Metadata, in Volume 99;
- Hawking, David - Automated Discovery of Search Interfaces on the Web, in Volume 17;
- Challenges in Enterprise Search, in Volume 27;
- How Valuable is External Link Evidence When Searching Enterprise Webs?, in Volume 27;
- Performance and Cost Tradeoffs in Web Search, in Volume 27;
- Hawkins, John - Comparing SVM Sequence Kernels: A Subcellular Localization Theme, in Volume 73;
- Multi-stage Redundancy Reduction: Effective Utilisation of Small Protein Datasets, in Volume 73;
- Hawkins, Richard - A Contract-based Approach to Designing Safe Systems, in Volume 33;
- Hawley, Simon - On pedagogically sound examples in public-key cryptography, in Volume 48;
- Hawryszkiewycz, I.T. - A Framework for Integrating Learning into Business Processes, in Volume 46;
- Hawryszkiewycz, Igor - The Impact on the Changing Business Process Spectrum on Conceptual Modeling, in Volume 67;
- Hay, Brian - Trust Requirements in Identity Management, in Volume 44;
- Hayashi, Yukio - Spatial analysis of centralization and decentralization in the population migration network, in Volume 60;
- Hayes, I. - Translating Refined Logic Programs to Mercury, in Volume 4;
- Hayes, Ian - Integration of generic program analysis tools into a software development environment, in Volume 38;
- Hayward, Ross - Trust Network Analysis with Subjective Logic, in Volume 48;
- Haywood, Liz - Learning about Software Development - Should Programming Always Come First?, in Volume 30;
- Programming students need instant feedback!, in Volume 20;
- He, Charles - Tamper-proofing Software Watermarks, in Volume 32;
- He, Hongxing - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
- Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
- He, Jing - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
- He, Q. - Rule Sets Based Bilevel Decision Model, in Volume 48;
- He, Sean Xiangjian - Edge Detection Based on Modified BP Algorithm of ANN, in Volume 36;
- Multi-Scale Edge Detection with Bilateral Filtering in Spiral Architecture, in Volume 36;
- He, Xiangjian - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38;
- Image Segmentation on Spiral Architecture, in Volume 11;
- Heckenberg, Stewart G. - Visualisation of the Minority Game Using a Mod, in Volume 35;
- Hegazy, Nadia - A Study of Local and Global Thresholding Techniques in Text Categorization, in Volume 61;
- Heinlein, Christian - Support for Subtyping and Code Re-use in Timor, in Volume 10;
- Heinz, Steffen - Performance of Data Structures for Small Sets of Strings, in Volume 4;
- Heiser, Gernot - A Resource Management Framework for Priority-Based Physical-Memory Allocation, in Volume 6;
- Heitmeyer, Constance - Developing Safety-Critical Systems: The Role of Formal Methods and Tools, in Volume 55;
- Hemer, David - A Formal Approach to Component Adaptation and Composition, in Volume 38;
- HazLog: Tool Support for Hazard Management, in Volume 47;
- Plug-in Proof Support for Formal Development Environments, in Volume 41;
- Supporting Component-Based Reuse in CARE, in Volume 4;
- Translating Refined Logic Programs to Mercury, in Volume 4;
- Henderson-Sellers, Brian - The Rationale of Powertype-based Metamodelling to Underpin Software Development Methodologies, in Volume 43;
- Henricksen, Matt - Algebraic Analysis of LEX, in Volume 98;
- Securing Grid Data Using Mandatory Access Controls, in Volume 68;
- Henshall, Kevin - Boolean Affine Approximation with Binary Decision Diagrams, in Volume 94;
- Hepp, Pedro - Improving Literacy and Numeracy in Poor Schools: The Main Challenge in Developing Countries, in Volume 34;
- Heravizadeh, Mitra - Making Workflows Context-aware: A Way to Support Knowledge-intensive Tasks, in Volume 79;
- Herbert, Nicole - Quantitative Peer Assessment: Can students be objective?, in Volume 66;
- Student timesheets can aid in curriculum coordination, in Volume 66;
- Herbert, Ric D. - A Grid Resource Allocation Mechanism for Heterogeneous E-waste Computers, in Volume 99;
- Visualisation of the Minority Game Using a Mod, in Volume 35;
- Hering, Joachim A. - Empirical Knowledge and Genetic Algorithms for Selection of Amide I Frequencies in Protein Secondary Structure Prediction, in Volume 29;
- Herlihy, Brian - Boolean equation solving as graph traversal, in Volume 51;
- Hersh, William - Do Clarity Scores for Queries Correlate with User Performance?, in Volume 27;
- Hesketh, Alan - Making 12,000 Healthcare Organisations Interoperate, and Other Challenges, in Volume 97;
- Hess, William - Principles for Modelling of a Dose Form Vocabulary, in Volume 58;
- Heuser, Carlos A. - SimEval - A Tool for Evaluating the Quality of Similarity Functions, in Volume 83;
- Hew, Patrick Chisan - Visualisation of Surveillance Coverage by Latency Mapping, in Volume 24;
- Hexel, Rene - 'Powerpoint to the People' : Suiting the Word to the Audience, in Volume 28;
- FITS - A Fault Injection Architecture for Time-Triggered Systems, in Volume 16;
- Heyer, Clint - Ambient Interaction Framework - Software Infrastructure for the Rapid Development of Pervasive Computing Environments, in Volume 25;
- Hidders, Jan - Conflict Scheduling of Transactions on XML Documents, in Volume 27;
- Peer-to-Peer Form Based Web Information Systems, in Volume 49;
- When are two Workflows the Same?, in Volume 41;
- Hidehiko, Tanaka - Proposal for Effective Information Flow Control Model for Sharing and Protecting Sensitive Information, in Volume 98;
- Hideshima, Yusuke - STARMINE : A Visualization System for Cyber Attacks, in Volume 60;
- Hiew, Hong Liang - Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources, in Volume 44;
- Higgins, Chris - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
- Higgins, Phillip - Intelligent Visualisation of Social Network Analysis Data, in Volume 2;
- Hilderman, Robert - A Characterization of Wordnet Features in Boolean Models For Text Classification, in Volume 61;
- Categorical Proportional Difference: A Feature Selection Method for Text Categorization, in Volume 87;
- Hilker, Michael - Description of Bad-Signatures for Network Intrusion Detection, in Volume 54;
- Hill, Michael J. - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
- Hillenbrand, Stephen Peter - Developing a Location Based Tourist Guide Application, in Volume 21;
- Hinchey, Michael G. - Confessions of a Formal Methodist, in Volume 15;
- Hine, John H. - Auction Based Resource Negotiation in NOMAD, in Volume 38;
- Securing Distributed Computing Against the Hostile Host, in Volume 26;
- Hingston, Philip F. - A Dynamic Communication Algorithm for Digital Halftoning, in Volume 4;
- Using Finite State Automata for Sequence Mining, in Volume 4;
- Hintz, Tom - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38;
- Image Segmentation on Spiral Architecture, in Volume 11;
- Hinze, Annika - Approximative Filtering of XML Documents in Publish/Subscribe Systems, in Volume 48;
- Event-based Communication for Location-based Service Collaboration, in Volume 92;
- Interaction Design for a Mobile Context-Aware System using Discrete Event Modelling, in Volume 48;
- Pruning Subscriptions in Distributed Publish/Subscribe Systems, in Volume 48;
- The Challenge of Creating Cooperating Mobile Services: Experiences and Lessons Learned, in Volume 48;
- Hiremath, P. S. - Extraction of Flat and Nested Data Records from Web Pages, in Volume 61;
- Hisil, Huseyin - Faster Group Operations on Elliptic Curves, in Volume 98;
- Hitchens, Michael - A Focus Group Study of Student Attitudes to Lectures, in Volume 95;
- Ho-Stuart, Chris - Developing and Delivering a Software Internationalisation Subject, in Volume 32;
- Key Challenges in Software Internationalisation, in Volume 32;
- Ho, TuBao - Knowledge Visualization in Hepatitis Study, in Volume 60;
- Ho, Van - A BDI Agent Architecture for Dialogue Modelling and Coordination in a Smart Personal Assistant, in Volume 57;
- Hoad, Timothy C. - Video Similarity Detection for Digital Rights Management, in Volume 16;
- Hoang, Doan B. - A Simulation Study of Using ER Feedback Control to Transport Compressed Video over ATM Networks, in Volume 2;
- Hoang, Thuong N. - Augmenting Image Place AR 3D Interactions for Wearable Computers, in Volume 93;
- Hobbs, Vaughan - A Unified Taxonomic Framework for Information Visualization, in Volume 24;
- Hoehn, Gerald - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
- Hoffman, Mark E. - The Case for More Digital Logic in Computer Architecture, in Volume 30;
- Hoffmann, Jan - Frequency Space Representation of Transitions of Quadruped Robot Gaits, in Volume 26;
- Hofinger, Thomas - A Component-Based Application Framework for Manufacturing Execution Systems in C# and .NET, in Volume 10;
- Hofstede, Arthur H.M. ter - When are two Workflows the Same?, in Volume 41;
- Hogan, James M. - Bacterial Promoter Modeling and Prediction for E. Coli and B. Subtilis with Beagle, in Volume 73;
- Developing and Delivering a Software Internationalisation Subject, in Volume 32;
- Developing the Software Engineering Team, in Volume 42;
- Key Challenges in Software Internationalisation, in Volume 32;
- Tight Spirals and Industry Clients: The Modern SE Education Experience, in Volume 42;
- Hogg, K. - An Evaluation of Web Services in the Design of a B2B Application, in Volume 26;
- Hogg, Richard - ICT Education - The Challenge for the Future, in Volume 23;
- Holford, John W. - Using Self-Defending Objects to Develop Security Aware Applications in Java, in Volume 26;
- Holkner, Alex - Evaluating the dynamic behaviour of Python applications, in Volume 91;
- Holkner, Bernard - Four Platforms : Moral perspectives on Information Technology, in Volume 23;
- Holmberg, Nathan - A Framework for InteractiveWeb-Based Visualization, in Volume 50;
- Holt, Jason E. - Logcrypt: Forward Security and Public Verification for Secure Audit Logs, in Volume 54;
- Holvoet, Tom - A Tool for Component Based Design of Embedded Software, in Volume 10;
- Homola, Martin - Towards Distributed Tableaux Reasoning Procedure for DDL with Increased Subsumption Propagation between Remote Ontologies, in Volume 90;
- Hong, Hai - Novel Elastic Registration for 2-D Medical and Gel Protein Images, in Volume 19;
- Hong, Seok-Hee - How People Read Sociograms: A Questionnaire Study, in Volume 60;
- Layered Drawings of Directed Graphs in Three Dimensions, in Volume 45;
- Predicting Graph Reading Performance: A Cognitive Approach, in Volume 60;
- Puzzle Generators and Symmetric Puzzle Layout, in Volume 45;
- The Metro Map Layout Problem, in Volume 35;
- Visual Analysis of Network Centralities, in Volume 60;
- Visualisation of Symmetry in Graphs, in Volume 2;
- Hongladarom, Soraj - Exploring the Philosophical Terrain of the Digital Divide, in Volume 37;
- Hongtao, Su - Face Recognition Using Multi-feature and Radial Basis Function Network, in Volume 22;
- Honnappa, Harsha - Customer Event Rate Estimation Using Particle Filters, in Volume 87;
- Hooijmaijers, Dennis - Enhancing Subjective Ontologies with Social Tagging Systems, in Volume 90;
- Trust Based Ontology Integration For The Community Services Sector, in Volume 72;
- Hope, Lucas - Layout of Bayesian Networks, in Volume 38;
- Hope, Lucas R. - Take Heart II: A Modular Bayesian Decision Support System, in Volume 68;
- Hopkins, Josie L. - Constructionist Learning and Teaching in a Computer Clubhouse Environment, in Volume 23;
- Psycles of Change: Development and Implementation of Databased Curriculum Documentation, in Volume 8;
- Hoppenbrouwers, S.J.B.A. - On Utility-based Selection of Architecture-Modelling Concepts, in Volume 43;
- Hornsby, Kathleen - A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values, in Volume 16;
- Horta, Ain Y. de - VELNET (Virtual Environment for Learning Networking), in Volume 30;
- Hoskens, Ian - Multi-sensory Game Interface Improves Player Satisfaction but not Performance, in Volume 76;
- Hosking, John - A Visual Language and Environment for Specifying User Interface Event Handling in Design Tools, in Volume 64;
- Building Multi-Device, Component-based, Thin-client Groupware: Issues and Experiences, in Volume 7;
- Design Pattern Modelling and Instantiation using DPML, in Volume 10;
- Generating mobile device user interfaces for diagram-based modelling tools, in Volume 50;
- Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
- Hosobe, Hiroshi - An Extended High-Dimensional Method for Interactive Graph Drawing, in Volume 45;
- Hosono, Chiharu - The Relative Completeness of a Version of CTL*, in Volume 41;
- Hou, Jingyu - Utilizing Hyperlink Transitivity to Improve Web Page Clustering, in Volume 17;
- Hou, Jinyu - Constructing Good Quality Web Page Communities, in Volume 5;
- Houben, Geert-Jan - XAL: An Algebra For XML Query Optimization, in Volume 5;
- Hoy, Jason E. Sew - BRINet: A BioResource Integration Network, in Volume 29;
- Hsieh, Bin-Tsan - On the Security of Some Proxy Blind Signatures Schemes, in Volume 32;
- Hsieh, Min-Sheng (Peter) - Supporting Software Reuse by the Individual Programmer, in Volume 48;
- Hsu, Ming-Fa - A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments, in Volume 38;
- Hsu, Tz-Heng - A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments, in Volume 38;
- Hsu, W. J. - Embedding of Fault-Tolerant Trees in the Josephus Cube, in Volume 6;
- Hsueh, Sue-Chen - Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream, in Volume 75;
- Hu, Hong - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61;
- A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73;
- Using Association Rules to Make Rule-based Classifiers Robust, in Volume 39;
- Hu, Jing - Diagonal Ordering: A New Approach to High-Dimensional KNN Processing, in Volume 27;
- Hu, Junquan - A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters, in Volume 44;
- Hu, Minjie - Bloom's Taxonomy for CS assessment, in Volume 78;
- Hu, Qimei - Multi-Scale Edge Detection with Bilateral Filtering in Spiral Architecture, in Volume 36;
- Hu, Xiaohua - Classification Comparison of Prediction of Solvent Accessibility From Protein Sequences, in Volume 29;
- Cluster Ensemble and Its Applications in Gene Expression Analysis, in Volume 29;
- Huang, Chung-Ming - A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments, in Volume 38;
- Huang, F.Y. - Programming with Heterogeneous Structures: Manipulating XML data Using bondi, in Volume 48;
- Huang, Fuchun - Breast Cancer Survivability via AdaBoost Algorithms, in Volume 80;
- Huang, Ing-Jer - Analysis of Hardware and Software Approaches to Embedded In-Circuit Emulation of Microprocessors, in Volume 6;
- Huang, Jiwu - A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters, in Volume 44;
- Huang, Kai - Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges, in Volume 11;
- Huang, Lianen - From WebArchive to WebDigest : Concept and Examples, in Volume 75;
- Huang, Mao Lin - Improvements of Space-Optimized Tree for Visualizing and Manipulating Very Large Hierarchies, in Volume 22;
- Information Visualization of Attributed Relational Data, in Volume 9;
- Visualising File-Systems Using ENCCON Model, in Volume 36;
- Huang, Sung-Cheng - A Statistical Method for Assessment of 3-D Medical Image Registration, in Volume 2;
- Huang, Weidong - How People Read Graphs, in Volume 45;
- How People Read Sociograms: A Questionnaire Study, in Volume 60;
- Predicting Graph Reading Performance: A Cognitive Approach, in Volume 60;
- Huang, Xiaodi - A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization, in Volume 38;
- Force-Transfer : A New Approach to Removing Overlapping Nodes in Graph Layout, in Volume 16;
- On the Structural Algorithm of Filtering Graphs for Layout, in Volume 36;
- Pattern Puzzle: A Metaphor for Visualizing Software Complexity Measures, in Volume 60;
- Huang, Xiaowei - Weak Parametric Failure Equivalences and Their Congruence Formats, in Volume 77;
- Huang, Zhiyi - Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory, in Volume 26;
- Supporting Large Scale eResearch Infrastructures with Adapted Live Streaming Capabilities, in Volume 82;
- Huang, Zi - Dimensionality Reduction in Patch-Signature Based Protein Structure Matching, in Volume 49;
- Hudaya, Anang - Commodity-Grid Based Distributed Pattern Recognition Framework, in Volume 82;
- Huebner, Ewa - Computer forensics workshop for undergraduate students, in Volume 78;
- Hugh, Thomas - 3D Visualisation of Tumours and Blood Vessels in Human Liver, in Volume 22;
- Semi-Automatic Feature Delineation In Medical Images, in Volume 35;
- Hughes, Baden - Building Computational Grids with Apple's Xgrid Middleware, in Volume 54;
- Making Connections: First Year Transition for Computer Science and Software Engineering Students, in Volume 42;
- Hui, L.C.K. - Tuning the Collision Test for Power, in Volume 26;
- Huisman, Marieke - Factorising Temporal Specifications, in Volume 41;
- Hung, Patrick C.K. - A Secure Workflow Model, in Volume 21;
- Hung, Regant Y. S. - An Optimal Broadcasting Protocol for Mobile Video-on-Demand, in Volume 65;
- Hungerford, Stuart - Integrating The MACHO Data-set with the Virtual Observatory, in Volume 44;
- Hunt, Fern - Using Markov Chain Analysis to Study Dynamic Behaviour in Large-Scale Grid Systems, in Volume 99;
- Hunt, Lynn - Exploring Conceptions of programming, in Volume 52;
- Hunter, Adam - Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources, in Volume 44;
- Hunter, Bruce - Assuring Separation of Safety and Non-safety Related Systems, in Volume 69;
- Hunter, Chris - Agent-Based Distributed Software Verification, in Volume 38;
- Hunter, Jane - The Development, Evaluation and Application of Ontologies to eResearch, in Volume 85;
- Hurst, A. J. - Performance and progression of first year ICT students, in Volume 78;
- Hurst, John - An Exploration of Internal Factors Influencing Student Learning of Programming, in Volume 95;
- Hurst, Nathan - Cobweb : A Constraint-Based WEB Browser, in Volume 16;
- Husemann, Martin - Providing Semantically Equivalent, Complete Views for Multilingual Access to Integrated Data, in Volume 83;
- Hussey, Andrew - Extending and Evaluating a Pattern Language for Safety-Critical User Interfaces, in Volume 3;
- Huston, Samuel - The Core Concept for 0/1 Integer Programming, in Volume 77;
- Hutchens, Ruston - Bandwidth Reservation Strategies for Mobility Support of Wireless Connections with QoS Guarantees, in Volume 4;
- Hutchins, Matthew - A Collaborative Guidance Case Study, in Volume 76;
- Hutterer, Peter - Enabling Co-located Ad-hoc Collaboration on Shared Displays, in Volume 76;
- Groupware Support in the Windowing System, in Volume 64;
- Lightweight User Interfaces for Watch Based Displays, in Volume 40;
- TIDL: Mixed Presence Groupware Support for Legacy and Custom Applications, in Volume 50;
- Huuck, Ralf - High Assurance System Software, in Volume 55;
- Hvam, K. - Some Structural and Geometric Properties of Two-Connected Steiner Networks, in Volume 65;
- Hwang, Gwan-Hwan - A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery, in Volume 63;
- Hwang, Sheng-Kun - Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream, in Volume 75;
- Hyvakka, Jouko - Implementing a Natural User Interface for Camera Phones Using Visual Tags, in Volume 50;
Top of ListI - Iga, Soichiro - SnapShoot: Integrating Semantic Analysis and Visualization Techniques for Web-based Note Taking System, in Volume 60;
- Igaki, Hiroshi - Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
- Ikeda, Katsuhiro - Generation of Relevance Maps and Navigation in A Digital Book, in Volume 60;
- Ilyin, Valentin - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
- Indrawan, Maria - A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios, in Volume 32;
- Indulska, Jadwiga - Asad Pirzada, Ryan Wishart, Marius Portmann and Jadwiga Indulska, in Volume 91;
- Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol, in Volume 62;
- Location Management in Pervasive Systems, in Volume 21;
- Quality of Service Support for Vertical Handovers in Pervasive Systems, in Volume 25;
- SuperstringRep: Reputation-enhanced Service Discovery, in Volume 38;
- Indulska, M. - On Aggregation Issues in Spatial Data Management, in Volume 5;
- Indulska, Marta - Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis, in Volume 83;
- Inenaga, Shunsuke - Testing Square-Freeness of Strings Compressed by Balanced Straight Line Program, in Volume 94;
- Inniss, Gail - Teaching for Tomorrow - Integrating Learning Technologies into Early Years Professional Development , in Volume 34;
- Innocent, Peter R. - Empirical Knowledge and Genetic Algorithms for Selection of Amide I Frequencies in Protein Secondary Structure Prediction, in Volume 29;
- Inoue, Naomi - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
- Irwin, Warwick - Informing the Design of Pipeline-Based Software Visualisations, in Volume 45;
- Inhomogeneous Force-Directed Layout Algorithms in the Visualisation Pipeline: From Layouts to Visualisations, in Volume 35;
- Visualising Class Cohesion with Virtual Worlds, in Volume 24;
- XML in the Visualisation Pipeline, in Volume 11;
- Isal, R. Yugo Kartono - Enhanced Word-Based Block-Sorting Text Compression, in Volume 4;
- Ishihara, Makio - Locating A Projector Using The Strength of Beams Reflected on a Screen, in Volume 64;
- Ishihara, Masaki - Ripple Presentation for Tree Structures with Historical Information, in Volume 60;
- Ishihara, Yukio - Locating A Projector Using The Strength of Beams Reflected on a Screen, in Volume 64;
- Ishii, Toshimasa - Augmenting Edge-Connectivity between Vertex Subsets, in Volume 94;
- Minimum Augmentation of Edge-Connectivity with Monotone Requirements in Undirected Graphs, in Volume 65;
- Minimum Cost Source Location Problem with Local 3-Vertex-Connectivity Requirements, in Volume 41;
- Ishikawa, Hiroshi - An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories, in Volume 39;
- Ishikawa, Masahiro - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
- Islam, Khandaker Shahidul - An Approach to Argumentation Context Mining from Dialogue History in an E-Market Scenario, in Volume 84;
- An E-Market Framework to Determine the Strength of Business Relationships between Intelligent Agents, in Volume 70;
- Islam, Md. Zahidul - A Framework for Privacy Preserving Data Mining, in Volume 32;
- Islas Sedano, Carolina - Computer science students can help to solve problems of multiplayer mobile games, in Volume 88;
- Itoh, Takayuki - Visualization of multi-dimensional data of bioactive chemicals using a hierarchical data visualization technique 'HeiankyoView', in Volume 60;
- Itzstein, G. Stewart - Applications of Join Java, in Volume 6;
- Ivins, Jim - Assessing the capability and maturity of capstone software engineering projects, in Volume 78;
- Engaging Undergraduates in Discussions about Ethics in Computing, in Volume 66;
- The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
- Using PSP to Evaluate Student Effort in Achieving Learning - Outcomes in a Software Engineering Assignment, in Volume 42;
- Ivkovic, Sasa - Applying Anatomical Therapeutic Chemical (ATC) and Critical Term Ontologies to Australian Drug Safety Data for Association Rules and Adverse Event Signalling, in Volume 58;
- Iyengar, Vijay - Analytics for Audit and Business Controls in Corporate Travel and Entertainment, in Volume 70;
- Izu, Cruz - Throughput fairness in k-ary n-cube networks., in Volume 48;
Top of ListJ - Jaakkola, Hannu - Early Assessment of Classification Performance, in Volume 32;
- Jackson, Kirk - Aspects to Visualising Reusable Components, in Volume 24;
- Visualising Reusable Software Over The Web, in Volume 9;
- XML Database Support for Program Trace Visualisation, in Volume 35;
- Jackson, Margaret - The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights, in Volume 44;
- Jacob, Verghese - 'When the Regulator Calls', in Volume 100;
- Jacobs, Grant - Signals in mRNAs that Influence the Initiation of Translation, in Volume 19;
- Jacobs, Timothy - Application of Focus + Context to UML, in Volume 24;
- Bubbleworld : A New Visual Information Retreival Technique, in Volume 24;
- Jaffar, Joxan - Constraint Logic Programming for Program Analysis, in Volume 74;
- Jakob, Mihaly - flashWeb: Graphical Modeling of Web Applications for Data Management, in Volume 83;
- Jakoniene, Vaida - Towards Transparent Access to Multiple Biological Databanks, in Volume 19;
- James, C.J. - Teaching Students How to be Computer Scientists Through Student Projects, in Volume 42;
- James, Geoff - Approaches for Semantic Interoperability between Domain Ontologies, in Volume 72;
- James, H.A. - Bootstrapping Computer Science in Old North Wales, in Volume 20;
- Middleware for Context Sensitive Mobile Applications, in Volume 21;
- Simulating a Computational Grid with Networked Animat Agents, in Volume 54;
- Teaching Students How to be Computer Scientists Through Student Projects, in Volume 42;
- James, Julie - Principles for Modelling of a Dose Form Vocabulary, in Volume 58;
- Jamieson, John - Regulation of Medical Devices involving Software in Australia - an Overview, in Volume 3;
- Jamieson, Peter - A Studio-Based Approach to Teaching Information Technology, in Volume 8;
- Jan, Tony - Face and Body Gesture Recognition for a Vision-Based Multimodal Analyzer, in Volume 36;
- Janczura, Chris - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12;
- Jang, Daniel - On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma, in Volume 26;
- Jang, Julian - Transactions in Loosely Coupled Distributed Systems, in Volume 17;
- Janneck, Jorn W. - Higher-Order Petri Net Modelling - Techniques and Applications, in Volume 12;
- Jansamak, S. - Formalization of UML Statechart Models Using Concurrent Regular Expressions, in Volume 26;
- Jansen, Klaus - On Packing Squares with Resource Augmentation: Maximizing the Profit, in Volume 41;
- Jansson, Jesper - On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
- Jarvinen, Hannu-Matti - CLIP, a Command Line InterPreter for a subset of C++, in Volume 88;
- JasonSmith, Michael - Get a Way Back : Evaluating Retrieval from History Lists, in Volume 18;
- Javadi, Bahman - Communication Network Analysis of the Enterprise Grid Systems, in Volume 68;
- Jay, C. Barry - A Relational Account of Objects, in Volume 48;
- Programming with Heterogeneous Structures: Manipulating XML data Using bondi, in Volume 48;
- Jayasinghe, Malith - The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed Workloads, in Volume 91;
- Jeacocke, David - Mining Medical Specialist Billing Patterns for Health Service Management, in Volume 87;
- Jennings, Andrew - Towards Nanocomputer Architecture, in Volume 6;
- Jennings, Phil - Towards an understanding of protein-protein interaction network heirarchies. Analysis of DnaN-binding peptide motifs in members of protein families interacting with the eubacterial processivity clamp, the subunit of DNA Polymerase III, in Volume 19;
- Jensen, Claus - On the Power of Structural Violations in Priority Queues, in Volume 65;
- Jeong, Byeong-Soo - ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns, in Volume 87;
- Jeremic, Nikifor - Access Control Models and Security Labelling, in Volume 62;
- Jesshope, Chris - Performance Evaluation on a Micro-threading Pipeline, in Volume 6;
- Jiang, Haifeng - Path Materialization Revisited: An Efficient Storage Model for XML Data, in Volume 5;
- Jiang, Ning - Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
- Jiang, Tao - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
- Jiang, Wen - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
- Jianu, Radu - An Experimental Study on Algorithms for Drawing Binary Trees, in Volume 60;
- Jiao, Li - Weak Parametric Failure Equivalences and Their Congruence Formats, in Volume 77;
- Jin, Hai - A Min-Min Average Algorithm for Scheduling Transaction-Intensive Grid Workflows, in Volume 99;
- Jin, Huidong - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
- Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
- Jin, Jesse J. - Web-based Multimedia GP Medical System, in Volume 36;
- Jin, Jesse S. - 3D Reconstruction of a Human Face with Monocular Camera Based on Head Movement, in Volume 36;
- A Confidence Based Recognition System for TV Commercial Extraction, in Volume 75;
- A Quantitative Analysis for Decomposing Visual Signal of the Gaze Displacement, in Volume 11;
- Automatic Extraction of Lung Boundaries by a Knowledge-Based Method, in Volume 2;
- Cataloging and Search Engine for Video Library, in Volume 2;
- Code Generation for Just-in-Time Compiled Mobile Collector Agents, in Volume 22;
- Compressed Video Transmission over Digital Networks : Analysis and Design, in Volume 22;
- Detection and Measurement of Hilar Region in Chest Radiograph, in Volume 22;
- Detection of Abnormal Texture in Chest X-rays with Reduction of Ribs, in Volume 36;
- Elastic Medical Image Registration Based on Image Intensity, in Volume 11;
- Enhancing Screen Teleconferencing with Streaming SIMD Extensions, in Volume 11;
- Home Photo Indexing using Learned Visual Keywords, in Volume 22;
- Media Streaming Synchronisation and Video Interaction : A Survey, in Volume 22;
- Modelling and Design of VAML, in Volume 11;
- Multimedia Index and Retrieval Under MARC Framework, in Volume 22;
- Object Tracking Using CamShift Algorithm and Multiple Quantized Feature Spaces, in Volume 36;
- Principles of Video Annotation Markup Language (VAML), in Volume 36;
- Relevance Feedback for Content-Based Image Retrieval Using Bayesian Network, in Volume 36;
- Robust Real-Time Tracking of Non-Rigid Objects, in Volume 36;
- Screen Capture - A Vector Quantisation Approach, in Volume 36;
- Segmentation-Based Multilayer Diagnosis Lossless Medical Image compression, in Volume 36;
- Shape Similarity Search Using XML and Portal Technology, in Volume 36;
- Texture Classification using Multi-Scale Scheme, in Volume 36;
- The Development of a Video Metadata Authoring and Browsing System in XML, in Volume 2;
- The Development of an Online Video Browing System, in Volume 11;
- Unseeded Region Growing for 3D Image Segmentation, in Volume 2;
- Using Dual Cascading Learning Frameworks for Image Indexing, in Volume 36;
- Video Cataloguing and Browsing, in Volume 11;
- View Synthesis by Image Mapping and Interpolation, in Volume 11;
- Visual Representation Model for Motion Direction Selectivity, in Volume 22;
- Jin, Yan - Lightweight Consistency Analysis of Dataflow Process Networks, in Volume 16;
- Jittrawong, Keerati - Optimizing XPath Queries on Streaming XML Data, in Volume 63;
- John, Mathias - Conceptional Modeling and Analysis of Spatio-Temporal Processes in Biomolecular Systems, in Volume 96;
- Johnson, C.W. - Location History in a Low-cost Context Awareness Environment, in Volume 21;
- Johnson, Chris - 'Powerpoint to the People' : Suiting the Word to the Audience, in Volume 28;
- Johnson, Chris R. - Biomedical Computing and Visualization, in Volume 48;
- Johnson, Chris W. - Analysing the Causes of the Italian and Swiss Blackout, 28th September 2003, in Volume 86;
- eScience Curricula at Two Australian Universities, in Volume 42;
- Redesigning the Intermediate Course in Software Design, in Volume 42;
- Johnson, Steven - e-Ghosts: Leaving Virtual Footprints in Ubiquitous Workspaces, in Volume 28;
- Johnsten, Tom - A Methodology for Hiding Knowledge in Databases, in Volume 14;
- Johnston, Benjamin - An algorithm for the induction of defeasible logic theories from databases, in Volume 17;
- Johnston, Stanley - Economic development via the Net in Oceania, in Volume 1;
- Johnston, W. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
- Johnstone, Ron - Supporting Coral Reef Ecosystems Research through Modelling Re-usable Ontologies, in Volume 90;
- Jones-Diaz, Criss - Multiple Literacies... Multiple Learning Opportunities , in Volume 34;
- Jones-Lee, Michael - Eliciting Measures of Value for Health and Safety, in Volume 47;
- Jones, Anthony J. - ICT and Future Teachers : Are We Prepared for E-Learning?, in Volume 23;
- Infusing ICT Use within the Early Years of Elementary Education, in Volume 34;
- Integration of ICT in an Initial Teacher Training Course: Participants' Views, in Volume 8;
- Jones, Beverley D. - Commonsense ISD: An Empirical Approach to Teaching Systems Analysis and Design, in Volume 42;
- Jones, Christian - Using Machinima to Promote Computer Science Study, in Volume 93;
- Jones, Jeff - Creative Research and Development Collaborations, in Volume 40;
- Jones, John - DVB-MHP/JavaTV Data Transport Mechanisms, in Volume 10;
- Jorns, Oliver - A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services, in Volume 68;
- Josang, Audun - A Method for Access Authorisation Through Delegation Networks, in Volume 54;
- An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems, in Volume 81;
- Belief Based Risk Analysis, in Volume 32;
- Mesmerize - an Open Framework for Enterprise Security Management, in Volume 32;
- Probabilistic Logic under Uncertainty, in Volume 65;
- Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign, in Volume 81;
- Security in Mobile Communications: Challenges and Opportunities, in Volume 21;
- Semantic Constraints for Trust Transitivity, in Volume 43;
- SuperstringRep: Reputation-enhanced Service Discovery, in Volume 38;
- Trust Network Analysis with Subjective Logic, in Volume 48;
- Trust Requirements in Identity Management, in Volume 44;
- Usability and Privacy in Identity Management Architectures, in Volume 68;
- User Interface Requirements for Authentication of Communication, in Volume 18;
- Joshi, Ramesh C. - Finding Similarity in Time Series Data by Method of Time Weighted Moments, in Volume 39;
- Joyce, Donald - Developing and Implementing a Professional Doctorate in Computing, in Volume 30;
- Jung, Oliver - A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services, in Volume 68;
- Jung, Seong Dae - Integrated Visualization for Geometry PIG Data, in Volume 60;
- Jung, Soon Ki - Integrated Visualization for Geometry PIG Data, in Volume 60;
- Jureta, Ivan J. - Clarifying Goal Models, in Volume 83;
Top of ListK - Kabir, Md Enamul - Conditional Purpose Based Access Control Model for Privacy Protection, in Volume 92;
- Kaburagi, T. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
- Kaila, Erkki - VILLE - a language-independent program visualization tool, in Volume 88;
- Kaiser, Bernhard - A New Component Concept for Fault Trees, in Volume 33;
- Kaiser, Fabian - flashWeb: Graphical Modeling of Web Applications for Data Management, in Volume 83;
- Kaiser, Robin - Emotions in HCI - An Affective E-Learning System, in Volume 56;
- Kaiya, Haruhiko - Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling, in Volume 96;
- Kamble, Anand S. - A Conceptual Model for Multidimensional Data, in Volume 79;
- Kamiura, Moto - Observational Heterarchy as Phenomenal Computing, in Volume 37;
- Kamleh, Waseem - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
- Kamp, Gerrit - Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis, in Volume 83;
- Kanamori, Yoshinari - Performance Evaluation of Combining Data Migration and Method Migration in Object Database Environments, in Volume 5;
- Kaneiwa, Ken - Logical Aspects of Events: Quantification, Sorts, Composition and Disjointness, in Volume 58;
- Kang, Byeong Ho - Using Formal Concept Analysis with an Incremental Knowledge Acquisition System for Web Document Management, in Volume 48;
- Kang, Hyunchul - Deferred Incremental Refresh of XML Materialized Views : Algorithms and Performance Evaluation, in Volume 17;
- Schemes of Storing XML Query Cache, in Volume 39;
- Kantarcioglu, Murat - An Architecture for Privacy-preserving Mining of Client Information, in Volume 14;
- Kanzaki, Yuichiro - Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
- Kao, Chung-Fu - Analysis of Hardware and Software Approaches to Embedded In-Circuit Emulation of Microprocessors, in Volume 6;
- Kaplan, Simon M. - Identifying Salient Learning Experiences: A Scenario-Based Method Enabling Industry-University Partnerships in IT, in Volume 20;
- Kaplan, Warren - Informative 3D Visualization of Multiple Protein Structures, in Volume 29;
- Kapurubandara, Mahesha - Incorporating Business Requirements and Constraints in Database Conceptual Model, in Volume 31;
- Karahasanovic, Amela - An Investigation into Keystroke Latency Metrics as an Indicator of Programming Performance, in Volume 42;
- Difficulties experienced by students in maintaining object-oriented systems: an empirical study, in Volume 66;
- Karimi, Mehdi - Minimum Cost Homomorphism to Oriented Cycles with Some Loops, in Volume 94;
- Karlapalem, Kamalakar - A Methodology and Toolkit for Deploying Contract Documents as E-contracts, in Volume 83;
- A Secure Workflow Model, in Volume 21;
- Active Meta Modeling Support for Evolving E-contracts, in Volume 83;
- View Relevance Driven Materialized View Selection in Data Warehousing Environment, in Volume 5;
- Karunaratne, S. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
- Karunaratne, Savant - A Fuzzy Rule-Based Interactive Methodology for Training Multimedia Actors, in Volume 2;
- Kasabov, N. - A Generic Connectionist-Based Method for On-Line Feature Selection and Modelling with a Case Study of Gene Expression Data Analysis, in Volume 19;
- Kasabov, Nikola - A Novel Feature Selection Method to Improve Classification of Gene Expression Data, in Volume 29;
- Kaschek, Roland - An e-Process Selection Model, in Volume 83;
- Context-Aware Web Information Systems, in Volume 31;
- Kasmarik, Kathryn - Experimental Evaluation of a Program Visualisation Tool for Use in Computer Science Education, in Volume 24;
- Kasprzak, Marta - On the complexity of the DNA Simplified Partial Digest Problem, in Volume 51;
- Kassab, Randa - A New Approach to Intelligent Text Filtering Based on Novelty Detection, in Volume 49;
- Kassabova, Diana - Motivational Patterns in Virtual Team Collaboration, in Volume 42;
- Katajainen, Jyrki - On the Power of Structural Violations in Priority Queues, in Volume 65;
- Katayama, Kaoru - An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories, in Volume 39;
- Katayama, Yoshiaki - Redundant Parallel Data Transfer Schemes for the Grid Environment, in Volume 54;
- Katsukura, Makoto - Assessing Usability for Input Operation using Frequency Components of Eye Movements, in Volume 93;
- System Usability Evaluation for Input Operation using Oculo-motors, in Volume 64;
- Kaufmann, Michael - Polygons Labelling of Minimum Leader Length, in Volume 60;
- Usage-based Visualization of Web Locations, in Volume 9;
- Kawasaki, Saori - Knowledge Visualization in Hepatitis Study, in Volume 60;
- Kay, Judy - Integrating Ethical Content Into Computing Curricula, in Volume 30;
- Learner Reflection in Student Self-assessment, in Volume 66;
- Student satisfaction with groupwork in undergraduate computer science : do things get better?, in Volume 20;
- The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
- The Neglected Battle Fields of Syntax Errors, in Volume 20;
- Kayed, Ahmad - Using Ontologies to Index Conceptual Structures for Tendering Automation, in Volume 5;
- Kearney, David - Applications of Join Java, in Volume 6;
- The Management of Applications for Reconfigurable Computing using an Operating System, in Volume 6;
- Keedy, J. Leslie - Support for Subtyping and Code Re-use in Timor, in Volume 10;
- Keefe, Karen - Adopting XP Practices for Teaching Object Oriented Programming, in Volume 52;
- Using Extreme Programming in a Capstone Project, in Volume 30;
- Kegel, Mark - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
- Keim, Bob - Should we assess our students' attitudes?, in Volume 88;
- Keith, Jonathan M. - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
- Kelarev, A.V. - A Polynomial Algorithm for Codes Based on Directed Graphs, in Volume 51;
- Kell, Catherine - Peer Assessment Using Aropa, in Volume 66;
- Kelley, Karen - Analytics for Audit and Business Controls in Corporate Travel and Entertainment, in Volume 70;
- Kelly, Peter M. - A Simplified Approach to Web Service Development, in Volume 54;
- Kelly, Tim - A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments, in Volume 33;
- Contract-Based Justification for COTS Component within Safety Critical Applications, in Volume 47;
- Using Software Architecture Techniques to Support the Modular Certification of Safety-Critical Systems, in Volume 69;
- Kelly, Wayne - Compiling Ruby on the CLR, in Volume 74;
- Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework, in Volume 62;
- G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework, in Volume 44;
- Reasoning about Data Parallelism in Modern Object-Oriented Languages, in Volume 74;
- Kelman, Chris - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
- Kemp, Elizabeth - In Support of User Interface Design in the Rational Unified Process, in Volume 7;
- What Makes a Good User Interface Pattern Language?, in Volume 28;
- Kemp, Zarine - Interoperability for Geospatial Analysis: a Semantics and Ontology-based Approach, in Volume 63;
- Kendall, Mike - Getting it Right From the Start: A Case Study of the Development of a Foundation Stage Learning and ICT Strategy in Northamptonshire, UK, in Volume 34;
- ICT and the Teacher of the Future, in Volume 23;
- Kenealy, Timothy - Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
- Kenelly, John - Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
- Kennedy, Angel - An Investigation of the State Formation and Transition Limitations for Prediction Problems in Recurrent Neural Networks, in Volume 74;
- Kennedy, Geoffrey J. - Peer-assessment in Group Projects: Is it worth it?, in Volume 42;
- Kennedy, Gregor E. - An Investigation into Keystroke Latency Metrics as an Indicator of Programming Performance, in Volume 42;
- Connecting Learning Environments Using Electronic Voting Systems, in Volume 42;
- Kennedy, Paul J. - Comparison of Visualization Methods of Genome-wide SNP Profiles in Childhood Acute Lymphoblastic Leukaemia, in Volume 87;
- Investigating the Size and Value Effect in Determining Performance of Australian Listed Companies: A Neural Network Approach, in Volume 61;
- Kernel-based Visualisation of Genes with the Gene Ontology, in Volume 87;
- Using a Kernel-Based Approach to Visualize Integrated Chronic Fatigue Syndrome Datasets, in Volume 61;
- Kennewell, Steve - Developing Research Models for ICT-Based Pedagogy, in Volume 23;
- Student Teachers' Experiences and Attitudes Towards Using Interactive Whiteboards in the Teaching and Learning of Young Children, in Volume 34;
- The Influence of a Technology-rich Classroom Environment on Elementary Teachers' Pedagogy and Children's Learning, in Volume 34;
- Keogh, Eamonn - We Have Seen the Future, and It Is Symbolic, in Volume 32;
- Khaled, O. Abou - Automating XML document Transformations: A conceptual modelling based approach, in Volume 31;
- Khaled, Rilla - A Case Study of Cartoon Visualisation Using AspectJ, in Volume 24;
- A Taxonomic Analysis of User-Interface Metaphors in the Microsoft Office Project Gallery, in Volume 40;
- From Pushing Buttons to Play and Progress: Value and Interaction in Fable, in Volume 50;
- InspectJ : Program Monitoring for Visualisation Using AspectJ, in Volume 16;
- Persuasive Interaction for Collectivist Cultures, in Volume 50;
- Khalil, Faten - A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses, in Volume 61;
- Integrating Recommendation Models for Improved Web page prediction accuracy, in Volume 74;
- Khan, Asad - Commodity-Grid Based Distributed Pattern Recognition Framework, in Volume 82;
- Khan, Asad I. - Towards Dynamic Data Grid Framework for eResearch, in Volume 54;
- Khan, Haroon R. - Understanding the Implementation of an Electronic Hospital Information System in a Developing Country: A Case Study from Pakistan, in Volume 97;
- Khan, Khaled M. - Incorporating Business Requirements and Constraints in Database Conceptual Model, in Volume 31;
- Khan, Umer - wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability, in Volume 87;
- Khandekar, Anushree - A Methodology and Toolkit for Deploying Contract Documents as E-contracts, in Volume 83;
- Khanli, L. Mohammad - Grid-JQA : Grid Java based Quality of service management by Active database, in Volume 54;
- Khanna, Sankalp - An Efficient Method for Indexing Now-relative Bitemporal data, in Volume 27;
- Khoo, Benjamin - Java Implementation Verification Using Reverse Engineering, in Volume 26;
- Khoury, Gerald R. - Elastic Metaphors: Expanding the Philosophy of Interface Design, in Volume 37;
- Enterprise Architecture Modelling using Elastic Metaphors, in Volume 31;
- Modelling Enterprise Architectures: An Approach Based on Linking Metaphors and Ontologies, in Volume 58;
- Ki, W. - Teacher Empowerment and Minimalist Design, in Volume 23;
- Kiessling, Werner - Optimization of Relational Preference Queries, in Volume 39;
- Kiili, Kristian - Technology Access : Resources Wasted in Computer Laboratories, in Volume 23;
- Kildare, Robert - An online tool for learning collaboration and learning while collaborating., in Volume 52;
- Kim, Bok Dong - Integrated Visualization for Geometry PIG Data, in Volume 60;
- Kim, Han-joon - Automated Data Warehousing for Rule-based CRM Systems, in Volume 17;
- Kim, James - Multi-Platform Document-Oriented GUIs, in Volume 93;
- Kim, Jinman - A Solution to the Distribution and Standarization of Multimedia Medical Data in E-Health, in Volume 11;
- A Web Based Medical Image Data Processing and Management System, in Volume 2;
- Integrated Multimedia Medical Data Agent in E-Health, in Volume 11;
- Kim, Kwangjo - Secure Key Issuing in ID-based Cryptography, in Volume 32;
- Kim, Minkoo - wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability, in Volume 87;
- Kim, Tae-Wan - A Distance-Based Packing Method for High Dimensional Data, in Volume 17;
- Kim, Younghyun - Schemes of Storing XML Query Cache, in Volume 39;
- King, Garry C. - A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data, in Volume 19;
- King, John - Parents' and Students' Satisfaction with the Use of Information Technology in Government Schools in Queensland, Australia, in Volume 8;
- King, Tristan - Developing CIMA-Based Cyberinfrastructure for Remote Access to Scientific Instruments and Collaborative e-Research, in Volume 68;
- Kinnunen, Paivi - A doctoral course in research methods in computing education research. How should we teach it?, in Volume 88;
- What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
- Kinshuk - Applications of variation theory in computing education, in Volume 88;
- Exploring Conceptions of programming, in Volume 52;
- Kirby, Graham - Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
- Kirchberg, Markus - On the Implication Problem for Functional Dependencies in the Higher-Order Entity-Relationship Model, in Volume 17;
- Solving the Golden Transaction Problem for ARIES-based Multi-level Recovery, in Volume 92;
- Using Reflection for Querying XML Documents, in Volume 49;
- Kirley, Michael - Supporting Casual Tutors and Demonstrators: A case study in computer science and software engineering, in Volume 52;
- Kit, Lau Hoi - Enumerating XML Data for Dynamic Updating, in Volume 39;
- Kitagawa, Takashi - Visualization of Music Impression in Facial Expression to Represent Emotion, in Volume 53;
- Kitamura, Motohiro - Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling, in Volume 96;
- Kitiyadisai, Krisana - Bridging the Digital Divide from a Buddhist Perspective with Implications for Public Policy, in Volume 37;
- Kitsuregawa, Masaru - WEB Community Mining and WEB Log Mining: Commodity Cluster Based Execution, in Volume 5;
- Kiyoki, Yasushi - A Semantic Associative Computation Method for Automatic Decorative-Multimedia Creation with 'Kansei' Information, in Volume 96;
- Klein, Gerwin - Formalising the L4 microkernel API, in Volume 51;
- High Assurance System Software, in Volume 55;
- Kleinermann, Frederic - Conceptual Modeling for Virtual Reality, in Volume 83;
- Klukas, Christian - Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs, in Volume 60;
- Knapskog, Svein J. - Belief Based Risk Analysis, in Volume 32;
- Knauer, Christian - Constructing Optimal Highways, in Volume 65;
- Kneale, Bruce - VELNET (Virtual Environment for Learning Networking), in Volume 30;
- Knight, John - GP Attitudes towards Using HI Systems in Their Professional Role, in Volume 97;
- Knight, John C. - Engineering, Communication, and Safety, in Volume 86;
- Knobelsdorf, Maria - Computer science in context - pathways to computer science, in Volume 88;
- Knowles, Greg - Hardware Acceleration of JPEG2000 Image Compression for Low-Power Embedded Applications, in Volume 16;
- Kobayashi, Takumi - Information Gathering Support Interface by the Overview Presentation of Web Search Results, in Volume 60;
- Kobayashi, Yuichi - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
- Kodituwakku, Saluka R. - Pattern Categories: A Mathematical Approach for Organizing Design Patterns, in Volume 13;
- Koehler, Henning - A Contraction Algorithm for finding Minimal Feedback Sets, in Volume 38;
- Domination Normal Form - Decomposing Relational Database Schemas, in Volume 62;
- Dynamic Data Warehouse Design as a Refinement in ASM-based Approach, in Volume 67;
- Koh, Kern - Optimizing Web Content Delivery Using Web Server Accelerator, in Volume 4;
- Koh, Yun Sing - Rare Association Rule Mining via Transaction Clustering, in Volume 87;
- Kohl, Lutz - Puck - a visual programming system for schools, in Volume 88;
- Kohli, G. - A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies, in Volume 38;
- Koike, Hideki - STARMINE : A Visualization System for Cyber Attacks, in Volume 60;
- Kolanski, Rafal - Formalising the L4 microkernel API, in Volume 51;
- Koliadis, George - Business Process Integration: Method and Analysis, in Volume 96;
- Model Eco-Systems: Preliminary Work, in Volume 79;
- Kolyshkina, Inna - Customer Analytics Projects: Addressing Existing Problems with a Process that Leads to Success, in Volume 70;
- Komina, Olga - RNA Secondary Structure Prediction with Simple Pseudoknots, in Volume 29;
- Komisarczuk, Peter - A Board Game for Teaching Internet Engineering, in Volume 52;
- Review of Work Experience in a Bachelor of Information Technology, in Volume 66;
- Koncek, Helena - Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20;
- Kong, Cindy - Towards a Semantic Basis for Rosetta, in Volume 26;
- Kong, Richard - Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
- Kong, Waiming - Support Vector Machine Approach for Cancer Detection Using Amplified Fragment Length Polymorphism (AFLP) Screening Method, in Volume 29;
- Kongsuwan, Kritaya - Towards an understanding of protein-protein interaction network heirarchies. Analysis of DnaN-binding peptide motifs in members of protein families interacting with the eubacterial processivity clamp, the subunit of DNA Polymerase III, in Volume 19;
- Kono, Hidetoshi - Structure-Function Relationship in DNA Sequence Recognition by Transcription Factors, in Volume 29;
- Konsky, Brian R. von - Java Implementation Verification Using Reverse Engineering, in Volume 26;
- Koo, Sang Ok - Integrated Visualization for Geometry PIG Data, in Volume 60;
- Koppi, Tony - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
- Koprinska, Irena - Classification of Brain-Computer Interface Data, in Volume 87;
- Korb, Kevin B. - Take Heart II: A Modular Bayesian Decision Support System, in Volume 68;
- Koschmider, Agnes - Measuring Similarity between Semantic Business Process Models, in Volume 67;
- Koschuetzki, Dirk - Visual Analysis of Network Centralities, in Volume 60;
- Kotagiri, Ramamohanarao - Approximate Data Mining in Very Large Relational Data, in Volume 49;
- Policies for Sharing Distributed Probabilistic Beliefs, in Volume 16;
- Kotsis, Gabriele - Towards Accurate Conflict Detection in a VCS for Model Artifacts: A Comparison of Two Semantically Enhanced Approaches, in Volume 96;
- Kowalczyk, Ryszard - Intelligent Agents for Automated One-to-Many e-Commerce Negotiation, in Volume 4;
- Kozlova, Iryna - Providing Semantically Equivalent, Complete Views for Multilingual Access to Integrated Data, in Volume 83;
- Krawczyk, Stefan - Grid Resource Allocation : Allocation Mechanisms and Utilisation Patterns, in Volume 82;
- Krieser, Francisco N. A. - SimEval - A Tool for Evaluating the Quality of Similarity Functions, in Volume 83;
- Krishna, P. Radha - A Methodology and Toolkit for Deploying Contract Documents as E-contracts, in Volume 83;
- Active Meta Modeling Support for Evolving E-contracts, in Volume 83;
- Krishnaswamy, Shonali - Cost-Efficient Mining Techniques for Data Streams, in Volume 32;
- Kristensen, Lars M. - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12;
- Modelling and Initial Analysis of Operational Planning Processes using Coloured Petri Nets, in Volume 12;
- Towards Formal Specification and Analysis of Avionics Mission Systems, in Volume 12;
- Kriz, Ron - Visualising Class Cohesion with Virtual Worlds, in Volume 24;
- Krumnack, Ulf - Extraction, evaluation and integration of lexical-semantic relations for the automated construction of a lexical ontology, in Volume 85;
- Krzywicki, Alfred - A BDI Agent Architecture for Dialogue Modelling and Coordination in a Smart Personal Assistant, in Volume 57;
- Kuehnberger, Kai-Uwe - Aspects of Automatic Ontology Extension: Adapting and Regeneralizing Dynamic Updates, in Volume 72;
- Kuffner, Adam - Image Feature Evaluation for Contents-based Image Retrieval, in Volume 56;
- Kuhne, Thomas - Contrasting Classification with Generalisation, in Volume 96;
- Kumar, Dinesh K. - Vowel recognition of English and German language using Facial movement(SEMG) for Speech control based HCI, in Volume 56;
- Kumar, Dinesh Kant - Hand gestures for HCI using ICA of EMG, in Volume 56;
- Voiceless Speech Recognition Using Dynamic Visual Speech Features, in Volume 56;
- Kumar, P. K. Ajith - Decoding Doodles: Novice Programmers and Their Annotations, in Volume 66;
- Kumar, P.K. Ajith - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
- Kummerfeld, Bob - 'Powerpoint to the People' : Suiting the Word to the Audience, in Volume 28;
- Integrating Ethical Content Into Computing Curricula, in Volume 30;
- Kummerfeld, Sarah K. - The Neglected Battle Fields of Syntax Errors, in Volume 20;
- Kung, H.F. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
- Kunze, Marcel - EGEE: Building a Pan-European Grid Training Organisation, in Volume 54;
- Grid Computing in Europe: From Research to Deployment, in Volume 44;
- Kuo, Chung J. - Visualisation and Comparison of DNA Sequences by Use of Three-Dimensional Trajectories, in Volume 19;
- Kuo, Dean - Transactions in Loosely Coupled Distributed Systems, in Volume 17;
- Kurata, Ken-ichi - Evaluation of Unique Sequences on the European Data Grid, in Volume 19;
- Kurokawa, Taketo - Japanese Landscape and My Environmental Design, in Volume 60;
- Kurowski, Maciej - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
- Kurzel, Frank - Adaptive Learning Environments for CS Education : From AMLE to Live Spaces, in Volume 20;
- Kutay, Cat - Up Close and Pedagogical: Computing Academics Talk About Teaching, in Volume 52;
- Kuts, Ekaterina - Computer science students can help to solve problems of multiplayer mobile games, in Volume 88;
- Kutty, Sangeetha - PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees, in Volume 70;
- Kutz, Oliver - Heterogeneously Structured Ontologies - Integration, Connection, and Refinement, in Volume 90;
- Kwan, Paul W.H. - A Multi-step Strategy for Approximate Similarity Search in Image Databases, in Volume 49;
- Kwok, Lam-for - Electronic Information Security Documentation, in Volume 21;
- Kwon, Hyok Don - Integrated Visualization for Geometry PIG Data, in Volume 60;
- Kwong, Hugh H.F. - A Method of Automatic Grade Calibration in Peer Assessment, in Volume 42;
Top of ListL - Laakso, Mikko-Jussi - VILLE - a language-independent program visualization tool, in Volume 88;
- Labudde, Dirk - 2D Visualisation of SMFS Data on Membrane Proteins, in Volume 83;
- Ladkin, Peter B. - Causal Analysis of the ACAS/TCAS Sociotechnical System, in Volume 47;
- Two Causal Analyses of the Black Hawk Shootdown during Operation Provide Comfort, in Volume 33;
- Laffey, James M. - Appropriation, Mastery and Resistance to Technology in Early Childhood Preservice Teacher Education: Case Studies, in Volume 34;
- Lahtinen, Essi - CLIP, a Command Line InterPreter for a subset of C++, in Volume 88;
- Effectiveness of integrating program visualizations to a programming course, in Volume 88;
- Fighting the student dropout rate with an incremental programming assignment, in Volume 88;
- Why should we bore students when teaching CS?, in Volume 88;
- Lai, David - Incorporating programming strategies explicitly into curricula, in Volume 88;
- Lai, Feipei - Sentry Tag: An Efficient Filter Scheme for Low Power Cache, in Volume 6;
- Lai, Paulo - Informative 3D Visualization of Multiple Protein Structures, in Volume 29;
- Lai, Wei - A Framework of Filtering, Clustering and Dynamic Layout Graphs for Visualization, in Volume 38;
- Force-Transfer : A New Approach to Removing Overlapping Nodes in Graph Layout, in Volume 16;
- On the Structural Algorithm of Filtering Graphs for Layout, in Volume 36;
- Lakos, Charles - Lightweight Consistency Analysis of Dataflow Process Networks, in Volume 16;
- Towards a Semantic Basis for Rosetta, in Volume 26;
- Lala, Gita H. - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
- Lam, Franky - Dynamic Labeling Schemes for Ordered XML Based on Type Information, in Volume 49;
- Querying and Maintaining Ordered XML Data using Relational Databases, in Volume 39;
- Lam, Fred C. - Nonparametric Approaches to Detecting Differentially Expressed Genes in Replicated Microarray Experiments, in Volume 29;
- Lam, H.C. - Teacher Empowerment and Minimalist Design, in Volume 23;
- Lam, Peng - Determining Component Reliability Using a Testing Index, in Volume 4;
- Lam, T.W. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
- Lambert, Dale - Mephisto I. - Towards a Formal Theory, in Volume 72;
- Lambrix, Patrick - Towards Transparent Access to Multiple Biological Databanks, in Volume 19;
- Lamirel, Jean-Charles - A New Approach to Intelligent Text Filtering Based on Novelty Detection, in Volume 49;
- Lamouchi, Olfa - A Framework Based Measurements for Evaluating an IS Quality, in Volume 79;
- Lan, Mingjun - Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
- Lane, Nicholas - An Empirical Study of Textual and Graphical Travel Itinerary Visualization using Mobile Phones, in Volume 18;
- Lane, T. - A Generic Connectionist-Based Method for On-Line Feature Selection and Modelling with a Case Study of Gene Expression Data Analysis, in Volume 19;
- Lang, Bruno - On The Optimal Working Set Size in Serial and Parallel Support Vector Machine Learning With The Decomposition Algorithm, in Volume 61;
- Lang, Catherine - The Next Wave of Gender Projects in IT Curriculum and Teaching at Universities, in Volume 52;
- Lange, Detta - Teachers Rethinking Curriculum Approaches within a New Basics Framework , in Volume 34;
- Langemann, Dirk - Selfish-brain Theory: Challenges in the Top-down Analysis of Metabolic Supply Chains, in Volume 83;
- Lanham, Elicia. J. - Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
- Lanthier, Mark A. - Calculating the Meeting Point of Scattered Robots on Weighted Terrain Surfaces, in Volume 41;
- Lariviere, Damien - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
- Larkin, James - Self-Replicating Expressions in the Lambda Calculus, in Volume 26;
- Latu, Savae - Teaching ICT to Pacific Island Background Students, in Volume 30;
- Lau, Derek - Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries, in Volume 63;
- Lau, Kim - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
- Laurent, Anne - S2MP: Similarity Measure for Sequential Patterns, in Volume 87;
- Lauria, Mario - Mega Weaver: A Simple Iterative Approach for BAC Consensus Assembly, in Volume 29;
- Lauwereins, Rudy - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
- Laval, Ernesto - Improving Literacy and Numeracy in Poor Schools: The Main Challenge in Developing Countries, in Volume 34;
- Lavery, William J. - The Semantic Reef: Managing Complex Knowledge to Predict Coral Bleaching on the Great Barrier Reef, in Volume 68;
- Laxer, Cary - Evolution of an International Collaborative Student Project, in Volume 95;
- Facilitating Global Computing Education Through Study Abroad and Collaborative Projects, in Volume 52;
- Le, Quynh - Where Does the Superhighway Lead Us? A Learners' Perspective, in Volume 8;
- Le, Thao - Collaborate to Learn and Learn to Collaborate, in Volume 8;
- Where Does the Superhighway Lead Us? A Learners' Perspective, in Volume 8;
- Leach, Geoff - eScience Curricula at Two Australian Universities, in Volume 42;
- Leaney, John - First Year Programming: Let All the Flowers Bloom, in Volume 20;
- Leckie, Christopher - Approximate Data Mining in Very Large Relational Data, in Volume 49;
- Policies for Sharing Distributed Probabilistic Beliefs, in Volume 16;
- Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, in Volume 38;
- Leclercq, Eric - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
- Lee, Byoungcheon - Secure Key Issuing in ID-based Cryptography, in Volume 32;
- Lee, Gareth - A Generalised Spreadsheet Verification Methodology, in Volume 4;
- Determining Component Reliability Using a Testing Index, in Volume 4;
- Exploiting FPGA Concurrency to Enhance JVM Performance, in Volume 26;
- Lee, Jeremy Y. - On Modelling Real-Time Mobile Processes, in Volume 4;
- Lee, Lawrence K. - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19;
- Lee, Michael D. - An Empirical Evaluation of Chernoff Faces, Star Glyphs, and Spatial Visualisations for Binary Data, in Volume 24;
- Role of Edge Detection in Video Semantics, in Volume 22;
- Lee, Minho - Integrated Visualization for Geometry PIG Data, in Volume 60;
- Lee, Mira - Computing a Minimum-Dilation Spanning Tree is NP-hard, in Volume 65;
- Lee, Sang Ho - An Empirical Study of Similarity Search in Stock Data, in Volume 84;
- Lee, Sang-goo - Automated Data Warehousing for Rule-based CRM Systems, in Volume 17;
- Lee, Scott U. K. Jin - Towards Verifying Semistructured Data, in Volume 67;
- Lee, Sofianto - Experiments in the Dynamics of Phase Coupled Oscillators When Applied to Graph Colouring, in Volume 74;
- Lee, TaeHee - Automated Data Warehousing for Rule-based CRM Systems, in Volume 17;
- Lee, Tan - A New Lip Feature Representation Method for Video-based Bimodal Authentication, in Volume 57;
- Lee, Tien Yu - Computer Assisted Assessment of SQL Query Skills, in Volume 63;
- Lee, Vincent - A ConceptLink Graph for Text Structure Mining, in Volume 91;
- Lee, Vincent C. S. - Adaptive Spike Detection for Resilient Data Stream Mining, in Volume 70;
- Discovering Frequent Sets from Data Streams with CPU Constraint, in Volume 70;
- Lee, Yi-Yi - Mental Map Preserving Graph Drawing Using Simulated Annealing, in Volume 60;
- Lee, Young-Koo - ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns, in Volume 87;
- Lefevre, Laurent - Improving the Flexibility of Active Grids through Web Services, in Volume 54;
- Supporting Large Scale eResearch Infrastructures with Adapted Live Streaming Capabilities, in Volume 82;
- Lefort, Laurent - Large scale colour ontology generation with XO, in Volume 58;
- Towards Scalable Ontology Engineering Patterns: Lessons Learned from an Experiment based on W3Cs Part-whole Guidelines, in Volume 72;
- Leinweber, Derek - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
- Leist, Arno - A Small-World Network Model for Distributed Storage of Semantic Metadata, in Volume 99;
- Leisten, Susanna - Using a Network Simulation Tool to Engage Students in Active Learning Enhances Their Understanding of Complex Data Communications Concepts., in Volume 42;
- Leitch, Shona - The Issue of Ethics in Electronic Commerce, in Volume 1;
- Lenarcic, John - The Open Source Singularity: A Postmodernist View, in Volume 37;
- Leopold, Jennifer L. - Identifying Character Non-Independence in Phylogenetic Data Using Data Mining Techniques, in Volume 29;
- Lesslie, Rob - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
- Lester, Nicholas - In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems, in Volume 26;
- Leung, Kingsly - Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters, in Volume 38;
- Levis, Alexander H. - Synthesizing Executable Models of Object Oriented Architectures, in Volume 12;
- Levit, Vadim - Well-covered Graphs and Greedoids, in Volume 77;
- Levy, Neil - Cyborgs-R-Us, in Volume 37;
- Levy, Nicole - A Framework Based Measurements for Evaluating an IS Quality, in Volume 79;
- Lewis, Andrew - A Template Based Static Coalition Protocol - A3PviGrid, in Volume 54;
- Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids, in Volume 82;
- Lewis, Sue - The Next Wave of Gender Projects in IT Curriculum and Teaching at Universities, in Volume 52;
- Lewis, Trent W. - Audio-Visual Speech Recognition Using Red Exclusion and Neural Networks, in Volume 4;
- Lip Feature Extraction Using Red Exclusion, in Volume 2;
- Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition, in Volume 26;
- Li, Chunping - TRACK : A Novel XML Join Algorithm for Efficient Processing Twig Queries, in Volume 75;
- Li, Dahai - Haptic Shoes: Representing Information By Vibration, in Volume 45;
- Li, Dongyang - TRACK : A Novel XML Join Algorithm for Efficient Processing Twig Queries, in Volume 75;
- Li, J. S. Jimmy - Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images, in Volume 26;
- Li, Jane - A Collaborative Guidance Case Study, in Volume 76;
- Li, Jianxin - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75;
- Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75;
- Li, Jianzhong - Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
- Li, Jie-Tsung - Tracking the Changes of Dynamic Web Pages in the Existence of URL Rewriting, in Volume 61;
- Li, Jinyan - Feature Space Transformation and Decision Results Interpretation, in Volume 19;
- From Informatics to Bioinformatics, in Volume 19;
- Use of Built-in Features in the Interpretation of High-dimensional Cancer Diagnosis Data, in Volume 29;
- Li, Jiuyong - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61;
- A Framework for Role-based group delegation in distributed environment, in Volume 48;
- A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses, in Volume 61;
- A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73;
- Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
- Integrating Recommendation Models for Improved Web page prediction accuracy, in Volume 74;
- Microdata Protection Through Approximate Microaggregation, in Volume 91;
- Priority Driven K-Anonymisation for Privacy Protection, in Volume 87;
- Using Association Rules to Make Rule-based Classifiers Robust, in Volume 39;
- Li, Ki-Joune - A Distance-Based Packing Method for High Dimensional Data, in Volume 17;
- Li, Kuo-Bin :Wang, Yi - Multiple Sequence Alignment Using Tabu Search, in Volume 29;
- Li, Li - Agent-based Ontology Integration for Ontology-based Applications, in Volume 58;
- Li, Lichao - Learner Reflection in Student Self-assessment, in Volume 66;
- Li, Ling - Cloth Animation with Adaptively Refined Meshes, in Volume 38;
- Li, Min - An efficient hash-based algorithm for minimal k-anonymity, in Volume 74;
- Privacy-aware Access Control with Generalization Boundaries, in Volume 91;
- Li, Ming - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
- Li, Qing - Multimedia Data Modelling: Moving Up the Ladder, in Volume 79;
- Li, Shuai Cheng - Faster Algorithms for Finding Missing Patterns, in Volume 51;
- Li, Wanchun - Adding Filtering to Geometric Distortion to Visualize a Clustered Graph on Small Screens, in Volume 35;
- Using Spring Algorithms to Remove Node Overlapping, in Volume 45;
- Li, Xiaoming - From WebArchive to WebDigest : Concept and Examples, in Volume 75;
- Li, Xiaosong - Teaching Introductory Programming to Information Systems and Computing Majors: Is There a Difference?, in Volume 30;
- Li, Xue - A Reconstruction-based Algorithm for Classification Rules Hiding, in Volume 49;
- Data Reduction Approach for Sensitive Association Classification Rule Hiding, in Volume 75;
- Determining the Fitness of a Document Model by Using Conflict Instances, in Volume 39;
- Document Generality: its Computation for Ranking, in Volume 49;
- Graph Mining based on a Data Partitioning Approach, in Volume 75;
- Ranking-Constrained Keyword Sequence Extraction from Web Documents, in Volume 92;
- Recency-Based Collaborative Filtering, in Volume 49;
- Li, Xueming - Ontological Semantics for the Use of UML in Conceptual Modeling, in Volume 83;
- Li, Yamin - Metacube - A New Interconnection Network for Large Scale Parallel Systems, in Volume 6;
- Li, Yijun - A Confidence Based Recognition System for TV Commercial Extraction, in Volume 75;
- Li, Yuan Fang - Towards Verifying Semistructured Data, in Volume 67;
- Li, Yuefeng - Data Mining For Lifetime Prediction of Metallic Components, in Volume 61;
- PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees, in Volume 70;
- Liang, Ping - Detecting Anomalous Longitudinal Associations Through Higher Order Mining, in Volume 84;
- Discovering Itemset Interactions, in Volume 91;
- Liao, Chia-Hung - Exploiting Speculative Value Reuse Using Value Prediction, in Volume 6;
- Liao, Hong-Yuan - An Integrated Approach to Video Retrieval, in Volume 75;
- Liegl, Philipp - Conceptual Business Document Modeling using UN/CEFACT's Core Components, in Volume 96;
- Liew, Alan Wee-Chung - Gene Expression Data Clustering and Visualization Based on a Binary Heirarchical Clustering Framework, in Volume 19;
- Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
- Lifeng, Duan - Line Drawing in Virtual Reality using a Game Pad, in Volume 50;
- Liggesmeyer, Peter - A New Component Concept for Fault Trees, in Volume 33;
- Lim, Chee Chern - Shape Similarity Search Using XML and Portal Technology, in Volume 36;
- Web-based Multimedia GP Medical System, in Volume 36;
- Lim, Ee-Peng - CrystalBall : A Framework for Mining Variants of Association Rules, in Volume 17;
- Lim, Joo-Hwee - Home Photo Indexing using Learned Visual Keywords, in Volume 22;
- Image Mosaics Based on Homogenous Coordinates, in Volume 22;
- Using Dual Cascading Learning Frameworks for Image Indexing, in Volume 36;
- Lim, Yu S. - A Web-based Collaborative System for Medical Image Analysis and Diagnosis, in Volume 2;
- Web-based Multimedia Collaboration System for Medical Images Analysis and Diagnosis, in Volume 22;
- Lim, Yusuk - Web-based Image Authentication Using Invisible Fragile Watermark, in Volume 11;
- Limaye, Nutan - Longest Paths in Planar DAGs in Unambiguous Logspace, in Volume 94;
- Limthanmaphon, Benchaphon - Web Service Composition Transaction Management, in Volume 27;
- Web Service Composition with Case-Based Reasoning, in Volume 17;
- Lin, Chun-Cheng - Mental Map Preserving Graph Drawing Using Simulated Annealing, in Volume 60;
- Lin, Jessica - We Have Seen the Future, and It Is Symbolic, in Volume 32;
- Lin, Joe Y.-C. - Customizing Internal Activity Behaviour for Flexible Process Enforcement, in Volume 27;
- Lin, Li - The Fish-eye Visualization of Foreign Currency Exchange Data Streams, in Volume 45;
- Lin, Marie - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
- Lin, Ming-Yen - Interactive Mining of Frequent Itemsets over Arbitrary Time Intervals in a Data Stream, in Volume 75;
- Lin, Nan - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
- Lin, Wilfred W. K. - A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively, in Volume 38;
- Lin, Xuemin - Clustering Moving Objects for Spatio-temporal Selectivity Estimation, in Volume 27;
- Continuously Maintaining Order Statistics over Data Streams, in Volume 63;
- Multi-resolution Algorithms for Building Spatial Histograms, in Volume 17;
- Lin, Yuanlie - A Novel Method for Protein Subcellular Localization Based on Boosting and Probabilistic Neural Network, in Volume 29;
- Lin, Yuqing - An open problem: (4; g)-cages with odd g <= 5 are tightly connected, in Volume 65;
- Lin, Zheng - Unseeded Region Growing for 3D Image Segmentation, in Volume 2;
- Lindsay, Peter - HazLog: Tool Support for Hazard Management, in Volume 47;
- Improved Acquisition Processes for Safety-Critical Systems in the Australian Department of Defence, in Volume 3;
- Modelling Erroneous Operator Behaviours for an Air-Traffic Control Task, in Volume 7;
- Supporting Component-Based Reuse in CARE, in Volume 4;
- Lindstrom, Bo - Operational Planning using Web-Based Interfaces to a Coloured Petri Net Simulator of Influence Nets, in Volume 12;
- Ling, Tok Wang - Update XML Data by Using Graphical Languages, in Volume 83;
- Lingas, Andrzej - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
- On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
- Link, Sebastian - Constraint Acquisition - You Can Chase but You Cannot Find, in Volume 79;
- English Sentence Structures and EER Modeling, in Volume 67;
- Horn Clauses and Functional Dependencies in Complex-value Databases, in Volume 49;
- Know your Limits: Enhanced XML Modeling with Cardinality Constraints, in Volume 83;
- Normalisation in the Presence of Lists, in Volume 27;
- On Inferences of Full Hierarchical Dependencies, in Volume 62;
- On the Implication Problem for Functional Dependencies in the Higher-Order Entity-Relationship Model, in Volume 17;
- On the Logical Implication of Multivalued Dependencies with Null Values, in Volume 51;
- Lippe, W. -M. - Analysing MEG-Data by a Combination of Different Neural Networks, in Volume 19;
- Lister, Raymond - A citation analysis of the ACE2005 - 2007 proceedings, with reference to the June 2007 CORE conference and journal rankings, in Volume 78;
- A Citation Analysis of the ACSC 2006-2008 Proceedings, with Reference to the CORE Conference and Journal Rankings, in Volume 91;
- A Comparison of Different Approaches to the Introductory Programming Course, in Volume 52;
- A Focus Group Study of Student Attitudes to Lectures, in Volume 95;
- After the gold rush: toward sustainable scholarship in computing, in Volume 78;
- An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
- Debating the OO debate: where is the problem?, in Volume 88;
- Differing Ways that Computing Academics Understand Teaching, in Volume 66;
- Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52;
- Experiments in the Dynamics of Phase Coupled Oscillators When Applied to Graph Colouring, in Volume 74;
- First Year Programming: Let All the Flowers Bloom, in Volume 20;
- Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78;
- Multi-Institutional Teaching Communities in Computer Education, in Volume 52;
- One Small Step Toward a Culture of Peer Review and Multi-Institutional Sharing of Educational Resources: A Multiple Choice Exam for First Semester Programming Students, in Volume 42;
- Teaching Java First: Experiments with a Pigs-Early Pedagogy, in Volume 30;
- The BRACElet 2009.1 (Wellington) Specification, in Volume 95;
- The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
- The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78;
- Up Close and Pedagogical: Computing Academics Talk About Teaching, in Volume 52;
- Why Teach Unix?, in Volume 66;
- Litchfield, Andrew - The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
- Little, Joyce Currie - Using Cases to Increase Interest in ICT and Computing as a Career, in Volume 23;
- Liu, Anna - Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf, in Volume 16;
- Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
- Liu, Chengfei - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75;
- Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75;
- Supporting Virtual Organisation Alliances with Relative Workflows, in Volume 53;
- Liu, Chuchang - Access Control Models and Security Labelling, in Volume 62;
- Combining Logics for Modelling Security Policies, in Volume 38;
- Towards Security Labelling, in Volume 48;
- Liu, Congrong - Modelling and Design of VAML, in Volume 11;
- Liu, Huiqing - Use of Built-in Features in the Interpretation of High-dimensional Cancer Diagnosis Data, in Volume 29;
- Liu, Jiming - Mobile Information Exchange and Integration: From Query to Application Layer, in Volume 92;
- Liu, Jing - Ranking-Constrained Keyword Sequence Extraction from Web Documents, in Volume 92;
- Liu, Jixue - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75;
- Liu, Junyang - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
- Liu, Ke - A Min-Min Average Algorithm for Scheduling Transaction-Intensive Grid Workflows, in Volume 99;
- Liu, Lin - Verification of the SIP Transaction Using Coloured Petri Nets, in Volume 91;
- Liu, Na - A Visual Language and Environment for Specifying User Interface Event Handling in Design Tools, in Volume 64;
- Liu, Nianjun - Discover Knowledge From Distribution Maps Using Bayesian Networks, in Volume 61;
- Liu, Qing - Multi-resolution Algorithms for Building Spatial Histograms, in Volume 17;
- Liu, Qiong - Digital Rights Management for Content Distribution, in Volume 21;
- Liu, Vicky - Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98;
- Open Trusted Health Informatics Structure (OTHIS), in Volume 80;
- Privacy and Security in Open and Trusted Health Information Systems, in Volume 97;
- Visually Sealed and Digitally Signed Documents, in Volume 26;
- Liu, Wei - Determining Termhood for Learning Domain Ontologies in a Probabilistic Framework, in Volume 70;
- Determining Termhood for Learning Domain Ontologies using Domain Prevalence and Tendency, in Volume 70;
- Integrated Scoring For Spelling Error Correction, Abbreviation Expansion and Case Restoration in Dirty Text, in Volume 61;
- Measuring Data-Driven Ontology Changes using Text Mining, in Volume 70;
- Liu, Yan - Designing a Test Suite for Empirically-based Middleware Performance Prediction, in Volume 10;
- Lloyd, Margaret - Reinvention of Childhood in a Networked World, in Volume 8;
- Lo, Neng-Wen - Visualisation and Comparison of DNA Sequences by Use of Three-Dimensional Trajectories, in Volume 19;
- Loekito, Elsa - Are Zero-suppressed Binary Decision Diagrams Good for Mining Frequent Patterns in High Dimensional Datasets?, in Volume 70;
- Loeser, Chris - Improving Resource Utilization for MPEG-4 Decoding in Embedded End-Devices, in Volume 26;
- Loh, Allan - The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
- Loh, Peter K. K. - Embedding of Fault-Tolerant Trees in the Josephus Cube, in Volume 6;
- Lokan, Chris - Using Chronological Splitting to Compare Cross- and Single-company Effort Models: Further Investigation, in Volume 91;
- Lonardi, Stefano - We Have Seen the Future, and It Is Symbolic, in Volume 32;
- Long, Benjamin - Cross-Layer Verification of Type Flaw Attacks on Security Protocols, in Volume 62;
- Formalising Key-Distribution in the Presence of Trust using Object-Z, in Volume 21;
- Long, Gregory - Plug-in Proof Support for Formal Development Environments, in Volume 41;
- Longley, Dennis - Electronic Information Security Documentation, in Volume 21;
- Lonnberg, Jan - How Students Develop Concurrent Programs, in Volume 95;
- Students' understandings of concurrent programming, in Volume 88;
- Looi, M. - Security as a Safety Issue in Rail Communications, in Volume 33;
- Loomes, Graham - Eliciting Measures of Value for Health and Safety, in Volume 47;
- Lopez, Mike - Surely We Must Learn to Read before We Learn to Write!, in Volume 95;
- Losberg, Warren - Student satisfaction with groupwork in undergraduate computer science : do things get better?, in Volume 20;
- Lovatt, Howard C. - A Pattern Enforcing Compiler (PEC) for Java: Using the Compiler, in Volume 43;
- Loveless, Avril - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
- Lovie-Kitchins, Jan - Data Mining in Conceptualising Active Ageing, in Volume 61;
- Lowe, Nick - Visualization of a Closed Three-Dimensional Surface using Portal-based Rendering, in Volume 60;
- Lu, Feng - A JMX Toolkit for Merging Network Management Systems, in Volume 48;
- A RMI Protocol for Aglets, in Volume 26;
- Lu, Hongen - Structure Based Semantic Measurement for Information Filtering Agents, in Volume 85;
- Lu, Hongjun - On Efficient Management of XML Documents, in Volume 17;
- Path Materialization Revisited: An Efficient Storage Model for XML Data, in Volume 5;
- Lu, J. - Rule Sets Based Bilevel Decision Model, in Volume 48;
- Lu, Lici - Extensible Job Managers for Grid Computing, in Volume 16;
- Lu, Ruopeng - Using a Temporal Constraint Network for Business Process Execution, in Volume 49;
- Lu, Wei C. - Visualisation and Comparison of DNA Sequences by Use of Three-Dimensional Trajectories, in Volume 19;
- Lu, Weiming - Weak Parametric Failure Equivalences and Their Congruence Formats, in Volume 77;
- Lu, Xiaoyan - Aggregation Query Model for OODBMS, in Volume 10;
- ODMG Extension of Composite Objects in OODBMS: A Proposal, in Volume 10;
- Lu, Yanmei - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
- Luca, Joe - Using Blended Learning to Enhance Teaching and Learning, in Volume 52;
- Lucas, Richard - Why Bother? Ethical Computers - That's Why!, in Volume 1;
- Lucey, Patrick - Patch-Based Representation of Visual Speech, in Volume 56;
- Lucey, Simon - Face Refinement through a Gradient Descent Alignment Approach, in Volume 56;
- Lucke, Dominik - Heterogeneously Structured Ontologies - Integration, Connection, and Refinement, in Volume 90;
- Luerssen, Martin H. - Graph Grammar Encoding and Evolution of Automata Networks, in Volume 38;
- Lui, Siu Man - Safely Delegating Data Mining Tasks, in Volume 61;
- Lundberg, Chris - TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
- Lundberg, Jonas - Lessons Learned from Facilitation in Collaborative Design, in Volume 64;
- Lundell, Eva-Marta - On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
- Luo, Bing - Performance Evaluation on a Micro-threading Pipeline, in Volume 6;
- Luo, Hong - Initial SARS Genome Data Analysis Using a Bioinformatics Platform, in Volume 29;
- Luo, Jingchu - Initial SARS Genome Data Analysis Using a Bioinformatics Platform, in Volume 29;
- Luo, Jizhou - Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
- Luoma, Harri - CLIP, a Command Line InterPreter for a subset of C++, in Volume 88;
- Lutteroth, Christof - A Maturity Model for Computing Education, in Volume 66;
- Automated Reverse Engineering of Hard-Coded GUI Layouts, in Volume 76;
- Multi-Platform Document-Oriented GUIs, in Volume 93;
- User Interface Layout with Ordinal and Linear Constraints, in Volume 50;
- Luu, Justin - Investigating the Size and Value Effect in Determining Performance of Australian Listed Companies: A Neural Network Approach, in Volume 61;
- Luxton-Reilly, Andrew - A Maturity Model for Computing Education, in Volume 66;
- Bloom's Taxonomy for CS assessment, in Volume 78;
- Quality of Student Contributed Questions Using PeerWise, in Volume 95;
- The PeerWise system of student contributed assessment questions, in Volume 78;
- Lv, Jianghua - An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries, in Volume 83;
- Lynar, Timothy M. - A Grid Resource Allocation Mechanism for Heterogeneous E-waste Computers, in Volume 99;
- Lynch, Kathy - A Studio-Based Approach to Teaching Information Technology, in Volume 8;
- Lysaght, Pauline - Child's Play: Computer Games, Theories of Play and Children's Development, in Volume 34;
- Lyuu, Yuh-Dauh - Spreading of Messages in Random Graphs, in Volume 94;
- Testing Embeddability Between Metric Spaces, in Volume 77;
Top of ListM - Ma Perez, Jesus - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87;
- Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
- Ma, Fangrui - EMAGEN: An Efficient Approach to Multiple Whole Genome Alignment, in Volume 29;
- RNA Secondary Structure Prediction with Simple Pseudoknots, in Volume 29;
- Ma, Hui - A Heuristic Approach to Cost-Efficient Derived Horizontal Fragmentation of Complex Value Databases, in Volume 63;
- A Heuristic Approach to Cost-Efficient Fragmentation and Allocation of Complex Value Databases, in Volume 49;
- Conceptual Application Domain Modelling, in Volume 96;
- Context Analysis: Toward Pragmatics of Web Information Systems Design, in Volume 79;
- Ma, Jiangang - Discovering User Access Pattern Based on Probabilistic Latent Factor Model, in Volume 39;
- Ma, Kenneth T.K. - A Method of Automatic Grade Calibration in Peer Assessment, in Volume 42;
- Ma, Kwan-Liu - BiblioViz: A System for Visualizing Bibliography Information, in Volume 60;
- Cyber Security Through Visualization, in Volume 60;
- Ma, Liping - Document Classification via Structure Synopses, in Volume 17;
- Ma, Lisha - Condensative Stream Query Language for Data Streams, in Volume 63;
- Ma, Shilong - An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries, in Volume 83;
- Maarek, Yoelle - A Grammer View for Editing Structured Documents, in Volume 11;
- Mabotuwana, Thusitha - Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
- MacColl, Ian - Ambient Interaction Framework - Software Infrastructure for the Rapid Development of Pervasive Computing Environments, in Volume 25;
- MacDonald, Anthony - Extending and Evaluating a Pattern Language for Safety-Critical User Interfaces, in Volume 3;
- Integration of generic program analysis tools into a software development environment, in Volume 38;
- MacDonald, Chris S. - The Development of a Distributed Capability System for VLOS, in Volume 6;
- Machanick, Philip - Peer Assessment for Action Learning of Data Structures and Algorithms, in Volume 42;
- Machi, Hidetomo - The Relative Completeness of a Version of CTL*, in Volume 41;
- Maciaszek, Leszek A. - Modeling and Engineering Adaptive Complex Systems, in Volume 83;
- Roundtrip Architectural Modelling, in Volume 43;
- MacIsaac, Peter - Principles for Modelling of a Dose Form Vocabulary, in Volume 58;
- Mackay, Daniel - A Lightweight Web-Based Case Tool for UML Class Diagrams, in Volume 18;
- Mackel, Oliver - A New Component Concept for Fault Trees, in Volume 33;
- MacNish, Cara - An Investigation of the State Formation and Transition Limitations for Prediction Problems in Recurrent Neural Networks, in Volume 74;
- Madden, Chris - Visualising Internet Traffic Data with Three-Dimensional Spherical Display, in Volume 45;
- Maddern, Rowan - The application of data mining techniques to characterize agricultural soil profiles, in Volume 70;
- Maeder, Anthony - Assessing Viewing Pattern Consistency in Mammogram Readers, in Volume 97;
- Characterizing Image Properties for Digital Mammograms, in Volume 97;
- e-Research Meets e-Health, in Volume 80;
- Maetschke, Stefan - Higher Order HMMs for Localization Prediction of Transmembrane Proteins, in Volume 73;
- Maetschke, Stefan R. - Bacterial Promoter Modeling and Prediction for E. Coli and B. Subtilis with Beagle, in Volume 73;
- Comparing SVM Sequence Kernels: A Subcellular Localization Theme, in Volume 73;
- Magenheim, Johannes - Social, Affective and Normative Aspects of Learning in ICT-Enriched Learning Environments - Collaborative Exploration of Societal Aspects of ICT, in Volume 23;
- Maglia, Anne M. - Identifying Character Non-Independence in Phylogenetic Data Using Data Mining Techniques, in Volume 29;
- Mahajan, Meena - Longest Paths in Planar DAGs in Unambiguous Logspace, in Volume 94;
- Mahdavi, Mehregan - A Collaborative Approach for Caching Dynamic Data in Portal Applications, in Volume 27;
- Maher, Michael - Rewriting General Conjunctive Queries Using Views, in Volume 5;
- Mahony, B. P. - A Lightweight Approach to Formal Safety Architecture Assurance: The PARTI Case Study, in Volume 100;
- Mahony, Brendan - Guidance for Def (Aust) 5679 Issue 2, in Volume 100;
- Hierarchical Verification Environment, in Volume 55;
- Revision of Australian Defence Standard Def (Aust) 5679, in Volume 55;
- Maier, David - Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE, in Volume 31;
- Maindonald, John - Data Mining Methodological Weaknesses and Suggested Fixes, in Volume 61;
- Maj, S.P. - A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies, in Volume 38;
- Modelling Layer 2 and Layer 3 Device Bandwidths using B-Node Theory, in Volume 48;
- Majumdar, Anirban - Manufacturing Opaque Predicates in Distributed Systems for Code Obfuscation, in Volume 48;
- Makela, Marko - Efficiently Verifying Safety Properties with Idle Office Computers, in Volume 12;
- Makino, Kazuhisa - Augmenting Edge-Connectivity between Vertex Subsets, in Volume 94;
- Malik, Muzaffar A. - Understanding the Implementation of an Electronic Hospital Information System in a Developing Country: A Case Study from Pakistan, in Volume 97;
- Malik, Petra - Interaction Design for a Mobile Context-Aware System using Discrete Event Modelling, in Volume 48;
- Transformation Rules for Z, in Volume 94;
- Malik, Robi - Interaction Design for a Mobile Context-Aware System using Discrete Event Modelling, in Volume 48;
- Malinowski, Elzbieta - A Conceptual Solution for Representing Time in Data Warehouse Dimensions, in Volume 53;
- Malkin, Michael - Comparison of Texts Streams in the Presence of Mild Adversaries, in Volume 44;
- Malloy, Brian A. - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
- Malmi, Lauri - A doctoral course in research methods in computing education research. How should we teach it?, in Volume 88;
- How Students Develop Concurrent Programs, in Volume 95;
- What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
- Mammadov, Musa - Effectiveness of Using Quantified Intermarket Influence for Predicting Trading Signals of Stock Markets, in Volume 70;
- Manderson, Kevin - Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists, in Volume 54;
- Mandrescu, Eugen - Well-covered Graphs and Greedoids, in Volume 77;
- Mangan, Peter - On Building Workflow Models for Flexible Processes, in Volume 5;
- Mann, Samuel - Similarity and originality in code: plagiarism and normal variation in student assignments, in Volume 52;
- Software engineering class eating its own tail, in Volume 66;
- Mannila, Linda - Improving mathematics and programming education - the IMPEd initiative, in Volume 88;
- Mansuy, Trevor - A Characterization of Wordnet Features in Boolean Models For Text Classification, in Volume 61;
- Mantoro, Teddy - Location History in a Low-cost Context Awareness Environment, in Volume 21;
- Maojo, Victor - SAT & ZB: Novel Tools to Acquire and Browse Conceptual Schemas from Public Online Databases for Biomedical Applications, in Volume 83;
- Mapelsden, David - Design Pattern Modelling and Instantiation using DPML, in Volume 10;
- Mar, J. C. - Model-Based Clustering in Gene Expression Microarrays : An Application to Breast Cancer Data, in Volume 19;
- On the Simultaneous Use of Clinical and Microarray Expression Data in the Cluster Analysis of Tissue Samples, in Volume 29;
- March, Verdi - DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids, in Volume 68;
- Mardaneh, Karim - Modified Global K-Means Algorithm for Clustering in Gene Expression Data Sets, in Volume 73;
- Margaliot, Adva - A Model for Training Future Science Teachers to Master the Cognitive Skill Melioration with ICT, in Volume 23;
- Markantonakis, Konstantinos - Countermeasures for Attacks on Satellite TV Cards using Open Receivers, in Volume 44;
- Markham, Selby - Performance and progression of first year ICT students, in Volume 78;
- Marquardt, O. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
- Marriott, Kim - Cobweb : A Constraint-Based WEB Browser, in Volume 16;
- Compact Layout of Layered Trees, in Volume 62;
- Layout of Bayesian Networks, in Volume 38;
- Marriott, Kym - Towards Flexible Graphical Communication Using Adaptive Diagrams, in Volume 45;
- Marshall, Gail - New Wine in Old Bottles or New Wine in New Bottles? Teaching Young Children with Technology , in Volume 34;
- The Gifts of Athena: Mindsets, Metaphors and Methods for 21st Century Learning, in Volume 34;
- Marshall, Stephen - Applying SPICE to e-Learning: An e-Learning Maturity Model?, in Volume 30;
- Less Extreme Programming, in Volume 30;
- Using a System of Tutorials and Groups to Teach User Interface Design, in Volume 42;
- Marshall, Stuart - A Web User Interface For An Interactive Software Repository, in Volume 28;
- Annotating UI Architecture with Actual Use, in Volume 76;
- Aspects to Visualising Reusable Components, in Volume 24;
- How (Not) To Help People Test Drive Code, in Volume 7;
- Less Extreme Programming, in Volume 30;
- Using Remotely Executing Software via a Mobile Device, in Volume 93;
- Using Software Visualisation to Enhance Online Component Markets, in Volume 35;
- Visualisations of Execution Traces (VET): An Interactive Plugin-Based Visualisation Tool, in Volume 50;
- Visualising Reusable Software Over The Web, in Volume 9;
- XML Database Support for Program Trace Visualisation, in Volume 35;
- Marsico, Annalisa - 2D Visualisation of SMFS Data on Membrane Proteins, in Volume 83;
- Martin, B. J. - Guidance for Def (Aust) 5679 Issue 2, in Volume 100;
- Martin, Jose I. - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87;
- Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
- Martin, Robin - Semi-Automatic Feature Delineation In Medical Images, in Volume 35;
- Martinaitis, Paul N. - Stream-Components: Component based Stream computation on the Grid, in Volume 99;
- Mason, Paul - A Pen-based Paperless Environment for Annotating and Marking Student Assignments, in Volume 50;
- Mason, Richard - Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing Framework, in Volume 62;
- G2-P2P: A Fully Decentralised Fault-Tolerant Cycle-Stealing Framework, in Volume 44;
- Masoodian, Masood - An Empirical Study of Textual and Graphical Travel Itinerary Visualization using Mobile Phones, in Volume 18;
- Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
- Visualization of Travel Itinerary Information on PDAs, in Volume 28;
- Masuda, Sumio - Improvements of TLAESA Nearest Neighbour Search Algorithm and Extension to Approximation Search, in Volume 48;
- Mathieson, Ian - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26;
- Mathieson, Luke - The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction, in Volume 38;
- The Parameterized Complexity of Regular Subgraph Problems and Generalizations, in Volume 77;
- Matono, Akiyoshi - A Path-based Relational RDF Database, in Volume 39;
- Matsubara, Wataru - Testing Square-Freeness of Strings Compressed by Balanced Straight Line Program, in Volume 94;
- Matsumoto, Ken-ichi - Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
- Matsumoto, T. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
- Matsuno, Hiroshi - Integrating Biopathway Databases for Large-scale Modeling and Simulation, in Volume 29;
- Matsushita, Soichiro - A Wearable Fatigue Monitoring System - Application of Human-Computer Interaction Evaluation, in Volume 50;
- Matters, Gabrielle - New Basics Pedagogies that Promote Multiliteracies , in Volume 34;
- Matthews, Iain - Face Refinement through a Gradient Descent Alignment Approach, in Volume 56;
- Fast and Accurate Active Appearance Models, in Volume 56;
- Matzko, Sarah - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
- Mauw, Sjouke - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
- Mavers, Diane - Children Drawing Children: Representing an Online Club in Mind Mapping , in Volume 34;
- May, Lauren - Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98;
- Open Trusted Health Informatics Structure (OTHIS), in Volume 80;
- Privacy and Security in Open and Trusted Health Information Systems, in Volume 97;
- Mayer, Nicolas - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
- Mayes, Keith - Countermeasures for Attacks on Satellite TV Cards using Open Receivers, in Volume 44;
- Mayo, Michael - Symbol Grounding and its Implications for Artificial Intelligence, in Volume 16;
- Mayr, Heinrich C. - Conceptual Requirements Modeling - a Contribution to XNP (eXtreme Non Programming), in Volume 53;
- McAndrew, Alasdair - Teaching image processing using minimal mathematics, in Volume 20;
- McAullay, Damien - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
- Analysis of Breast Feeding Data Using Data Mining Methods, in Volume 61;
- McBride, Noelene - New Basics Pedagogies that Promote Multiliteracies , in Volume 34;
- Teachers Rethinking Curriculum Approaches within a New Basics Framework , in Volume 34;
- McBurney, Peter - On Illegal Composition of First-Class Agent Interaction Protocols, in Volume 74;
- McCallum, John - An Interactive Visualisation for Investigating DNA Sequence Information, in Volume 35;
- An Interactive Visualisation for Selecting PCR Primers, in Volume 45;
- McCance, Gavin - Storage and Data Management in EGEE, in Volume 68;
- McCarthy, J. - Modelling Smart Security for Classified Rooms with DOVE, in Volume 12;
- McCarthy, Jim - Hierarchical Verification Environment, in Volume 55;
- McCartin, Catherine - Bounded Persistence Pathwidth, in Volume 41;
- McCartney, Robert - What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
- McComb, Tim - Tracing Information Flow Through Mode Changes, in Volume 48;
- McCormick, G. Frank - The Agnostic Hazard, in Volume 100;
- McCullagh, Adrian - An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems, in Volume 81;
- Commitment Issues in Delegation Process, in Volume 81;
- McCulloch, Alan - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
- McCulloch, Alan F. - BRINet: A BioResource Integration Network, in Volume 29;
- McDermid, John - A Contract-based Approach to Designing Safe Systems, in Volume 33;
- Safety Assurance Contracts for Integrated Modular Avionics, in Volume 33;
- The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation, in Volume 47;
- McDermid, John A. - High Level Failure Analysis for Integrated Modular Avionics, in Volume 3;
- Software Safety: Where's the Evidence?, in Volume 3;
- Trends in Systems Safety: A European View?, in Volume 15;
- McDonald, Chris - Dependable Dynamic Source Routing without a Trusted Third Party, in Volume 38;
- Establishing Trust In Pure Ad-hoc Networks, in Volume 26;
- Kerberos Assisted Authentication in Mobile Ad-hoc Networks, in Volume 26;
- Towards Customisable Tuple Field Matching in VLOS, in Volume 16;
- McDonald, Clement J. - Privacy-Preserving Distributed Queries for a Clinical Case Research Network, in Volume 14;
- McDonald, John R. - BRINet: A BioResource Integration Network, in Volume 29;
- McDougall, Anne - Constructionist Learning and Teaching in a Computer Clubhouse Environment, in Volume 23;
- Formal and Informal Environments for the Learning and Teaching of Computer Programming, in Volume 23;
- Psycles of Change: Development and Implementation of Databased Curriculum Documentation, in Volume 8;
- McDowall, Janet - Music Technology: New Literacies in the Early Years, in Volume 34;
- McGavin, Michael - Visualising Reusable Software Over The Web, in Volume 9;
- McGavin, Mike - Visualisations of Execution Traces (VET): An Interactive Plugin-Based Visualisation Tool, in Volume 50;
- McGill, Matthew - Graph Drawing Aesthetics and the Comprehension of UML Class Diagrams: An Empirical Study, in Volume 9;
- UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
- McGovern, Jim - CONFER: Towards Groupware for Building Consensus in Collaborative Software Engineering, in Volume 64;
- Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures, in Volume 62;
- McGrath, Mike - Intelligent Visualisation of Social Network Analysis Data, in Volume 2;
- McIlvenna, Stephen - Synthesis of Orchestrators from Service Choreographies, in Volume 96;
- McKay, Elspeth - Human-Computer Interaction Closes the Digital Divide: A multicultural, intergenerational ICT case study, in Volume 46;
- McKay, Judy - The Next Wave of Gender Projects in IT Curriculum and Teaching at Universities, in Volume 52;
- McKay, R.I. (Bob) - A Comparative Study for Domain Ontology Guided Feature Extraction, in Volume 16;
- McKenzie, Des - Integration of ICT into the Curriculum at Anderson's Creek Primary School, in Volume 23;
- McKenzie, Walter - Multiple Intelligences and Instructional Technology , in Volume 34;
- McKinnon, Alan E. - Visualising the Probability Distribution Function of Uncertain Data - Application to Stochastic Modelling of Ground Water Solute Transport, in Volume 9;
- McLachlan, G. J. - Clustering Replicated Microarray Data via Mixtures of Random Effects Models for Various Covariance Structures, in Volume 73;
- Model-Based Clustering in Gene Expression Microarrays : An Application to Breast Cancer Data, in Volume 19;
- On the Simultaneous Use of Clinical and Microarray Expression Data in the Cluster Analysis of Tissue Samples, in Volume 29;
- McLean, Patrick - Combining Logics for Modelling Security Policies, in Volume 38;
- McLean, Patrick G. - A Secure Pervasive Environment, in Volume 21;
- McLeod, Laurie - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
- McMullan, John - Negligence: Engineering Safety-Critical Systems, in Volume 15;
- McNally, Myles F. - A Comparison of Different Approaches to the Introductory Programming Course, in Volume 52;
- Walking the Grid: Robotics in CS 2, in Volume 52;
- McNamara, Robyn - Evaluating assessment with competency mapping, in Volume 30;
- McSporran, Mae - Facilitating Successful Online Computing Courses While Minimising Extra Tutor Workload, in Volume 30;
- Mehta, Hardik - Implementation of a Triple Modular Redundant FPGA based Safety Critical Systems for Reliable Software Execution, in Volume 69;
- Mehta, Snehal - Hospital Management Knowledge Discovery using Discrete Event Simulation, in Volume 68;
- Meikle, Steven R. - Functional Segmentation of Dynamic Emission Tomographic images, in Volume 2;
- Non-Invasive estimation of Cerebral Metabolic Rate of Glucose Using Simultaneous Estimation and Cluster Analysis: A feasibility Study, in Volume 2;
- Numerical Deconvolution by a Monte Carlo Approach with Application to Dynamic Cardiac Perfusion Tc-99m SPECT, in Volume 11;
- Meinicke, Larissa - Evaluation of a New Assesment Scheme for a Third-year Concurrency Course, in Volume 66;
- Meintjes, Peter - Evolution of Relative Synonymous Codon Usage in Human Immunodeficiency Virus Type 1, in Volume 29;
- Melnikoff, Steve - A Portal for Grid-enabled Physics, in Volume 44;
- Melser, Peter - Corporate Voices, Personal Voices: The Ethics of the Internet, in Volume 1;
- Melton, Hayden - Identifying Refactoring Opportunites by Identifying Dependency Cycles, in Volume 48;
- Jooj: Real-Time Support For Avoiding Cyclic Dependencies, in Volume 62;
- The CRSS Metric for Package Design Quality, in Volume 62;
- Mendes, Alexandre - Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data, in Volume 38;
- The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction, in Volume 38;
- Mendes, Emilia - Applying the Cognitive Flexibility Theory to Teaching Web Engineering, in Volume 20;
- Using Chronological Splitting to Compare Cross- and Single-company Effort Models: Further Investigation, in Volume 91;
- Mendiratta, Veena B. - Segregated Failures Model for Availability Evaluation of Fault-Tolerant Systems, in Volume 48;
- Mendling, Jan - On the Correlation between Process Model Metrics and Errors, in Volume 83;
- Mendoza, Rogan - Ontology Based Object Categorisation for Robots, in Volume 58;
- Menger, Gisela - Support for Subtyping and Code Re-use in Timor, in Volume 10;
- Menkhaus, Guido - MUSA-Shadow: Concepts, Implementation and Sample Applications - A Location-Based Service Supporting Multiple Devices, in Volume 10;
- Menon, Catherine - Towards a Semantic Basis for Rosetta, in Volume 26;
- Menzies, Alex - Business Process Integration: Method and Analysis, in Volume 96;
- Merkl, Dieter - An Adaptive Information Retrieval System Based on Associative Networks, in Volume 31;
- Improving Domain Ontologies by Mining Semantics from Text, in Volume 31;
- Merrick, Damian - An ILP for the metro-line crossing problem, in Volume 77;
- Graph Interaction through Force-Based Skeletal Animation, in Volume 35;
- Increasing the Readability of Graph Drawings with Centrality-Based Scaling, in Volume 60;
- Skeletal Animation for the Exploration of Graphs, in Volume 35;
- The Metro Map Layout Problem, in Volume 35;
- Mertens, C. - Analysing MEG-Data by a Combination of Different Neural Networks, in Volume 19;
- Messig, Michael - Autonomic System Management in Mobile Grid Environments, in Volume 68;
- Service Migration in Autonomic Service Oriented Grids, in Volume 82;
- Meyenn, Andrew - A Proposed Methodology for the Teaching of Information Technology Ethics in Schools, in Volume 1;
- Meyer, Sven - A Survey of Research on Context-Aware Homes, in Volume 21;
- Michel, Yann - Approximative Filtering of XML Documents in Publish/Subscribe Systems, in Volume 48;
- Event-based Communication for Location-based Service Collaboration, in Volume 92;
- Mickan, Katherine - Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
- Middlemiss, M. - A Generic Connectionist-Based Method for On-Line Feature Selection and Modelling with a Case Study of Gene Expression Data Analysis, in Volume 19;
- Middleton, Gaye L. - Copyright Conundrum - Liability of ISPs for Online Copyright Infringement, in Volume 44;
- Mikami, Yoshiki - Multilingual ICT Education: Language Observatory as a Monitoring Instrument, in Volume 46;
- Mildenhall, Greg - An Implementation of Parallel Pattern-Matching via Concurrent Haskell, in Volume 4;
- Miller, Kerrie M. - Computer-based Collaboration in Student Work: Does a Preference for using Technology Affect Performance?, in Volume 46;
- Miller, Mirka - An open problem: (4; g)-cages with odd g <= 5 are tightly connected, in Volume 65;
- On the Non-existence of Even Degree Graphs with Diameter 2 and Defect 2, in Volume 77;
- Security of Statistical Databases: Overview and Future Directions, in Volume 68;
- Miller, Tim - On Illegal Composition of First-Class Agent Interaction Protocols, in Volume 74;
- Mingins, Christine A. - Building Trust in Third-party Components using Component Wrappers in the .NET Frameworks, in Volume 10;
- Mir, Stephan - HOVER: Hybrid On-demand Distance Vector Routing for Wireless Mesh Networks, in Volume 74;
- Miret, J. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
- Miskell, Craig - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
- Misra, Manoj - OCP - A Distributed Real Time Commit Protocol, in Volume 49;
- Misue, Kazuo - Drawing Bipartite Graphs as Anchored Maps, in Volume 60;
- FindFlow: Visual Interface for Information Search based on Intermediate Results, in Volume 60;
- Generation of Relevance Maps and Navigation in A Digital Book, in Volume 60;
- Information Gathering Support Interface by the Overview Presentation of Web Search Results, in Volume 60;
- NeL2: Network Drawing Tool for Handling Layered Structured Network Diagram, in Volume 60;
- Ripple Presentation for Tree Structures with Historical Information, in Volume 60;
- Mitchell, Brice - Modelling and Initial Analysis of Operational Planning Processes using Coloured Petri Nets, in Volume 12;
- Mitchell, Geoff - Applying SPICE to e-Learning: An e-Learning Maturity Model?, in Volume 30;
- Mitchell, Ian - An Exploration of Internal Factors Influencing Student Learning of Programming, in Volume 95;
- Mitchell, Jason - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
- Mitchell, Margaret - Creating Minimal Vertex Series Parallel Graphs from Directed Acyclic Graphs., in Volume 35;
- Use of Directed Acyclic Graph Analysis in Generating Instructions for Multiple Users, in Volume 9;
- Use of Series Parallel Digraph Analysis in Generating Instructions for Multiple Users, in Volume 2;
- Mitchell, Phillip E. - Newspaper Document Analysis Featuring Connected Line Segmentation, in Volume 11;
- Mitchell, Simon - Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20;
- Mitchelson, Keith R. - Inferring an Original Sequence from Erroneous Copies : A Bayesian Approach, in Volume 19;
- Mitri, George - Automatic Music Classification Problems, in Volume 26;
- Miura, Kazuyuki - Rectangle-of-Influence Drawings of Four-Connected Plane Graphs, in Volume 45;
- Miura, Takao - Clustering Stream Data by Regression Analysis, in Volume 32;
- Miyano, Eiji - Graph Classes and the Complexity of the Graph Orientation Minimizing the Maximum Weighted Outdegree, in Volume 77;
- Graph Orientation Algorithms to Minimize the Maximum Outdegree, in Volume 51;
- Miyano, Satoru - Integrating Biopathway Databases for Large-scale Modeling and Simulation, in Volume 29;
- Miyoshi, Hiroyuki - From Reflection to Interaction: An Indirect Approach to the Philosophy of Computation, in Volume 37;
- Mlynkova, Irena - On Inference of XML Schema with the Knowledge of an Obsolete One, in Volume 92;
- UserMap : an Adaptive Enhancing of User-Driven XML-to-Relational Mapping Strategies, in Volume 75;
- Mocker, Martin - Development of an Electronic Commerce Portal System using a Specific Software Development Process, in Volume 10;
- Moelans, Bart - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83;
- Moffat, Alistair - Enhanced Word-Based Block-Sorting Text Compression, in Volume 4;
- Improved Retrieval Effectiveness Through Impact Transformation, in Volume 5;
- Index Compression Using Fixed Binary Codewords, in Volume 27;
- Lossless Image Compression Using Pixel Reordering, in Volume 26;
- Making Connections: First Year Transition for Computer Science and Software Engineering Students, in Volume 42;
- Performance and Cost Tradeoffs in Web Search, in Volume 27;
- Score Aggregation Techniques in Retrieval Experimentation, in Volume 92;
- What Drives Curriculum Change?, in Volume 30;
- Mogin, Pavle - S.E.A.L. - A Query Language for Entity-Association Queries, in Volume 92;
- Mohay, George - Distributed intrusion detection in clusters based on non-interference, in Volume 54;
- Synapse: Auto-correlation and Dynamic Attack Redirection in an Immunologically-inspired IDS, in Volume 54;
- Molla-Aliod, Diego - Natural Language Processing in the Undergraduate Curriculum, in Volume 20;
- Molle, Mart - TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
- Monahan, Rosemary - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
- Monden, Akito - A Framework for Obfuscated Interpretation, in Volume 32;
- Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
- Monk, Andrew F. - Simple, social, ethical and beautiful : requirements for UIs in the home, in Volume 76;
- Monostori, Krisztian - Signature Extraction for Overlap Detection in Documents, in Volume 4;
- Suffix Vector: Space- and Time-Efficient Alternative to Suffix Trees, in Volume 4;
- Monsifrot, Antoine - A Framework for Obfuscated Interpretation, in Volume 32;
- Montague, Paul - Translation of Rights Expressions, in Volume 44;
- Moon, ChanHo - Deferred Incremental Refresh of XML Materialized Views : Algorithms and Performance Evaluation, in Volume 17;
- Mooney, Carl H. - Marking Time in Sequence Mining, in Volume 61;
- Moreno, Andres - Con�ictive animations as engaging learning tools, in Volume 88;
- Morgan, Alex - Student Teachers' Experiences and Attitudes Towards Using Interactive Whiteboards in the Teaching and Learning of Young Children, in Volume 34;
- Morozova, Elena - A Multidimensional Bisection Method for Unconstrained Minimization Problem, in Volume 77;
- Morris, John - A Generalised Spreadsheet Verification Methodology, in Volume 4;
- Algorithm Animation: Using the Algorithm Code to Drive the Animation, in Volume 42;
- Determining Component Reliability Using a Testing Index, in Volume 4;
- Morris, Peter - Constructing Strictly Positive Families, in Volume 65;
- Morris, Sidney - Effectiveness of Using Quantified Intermarket Influence for Predicting Trading Signals of Stock Markets, in Volume 70;
- Morrison, Evan D. - Business Process Integration: Method and Analysis, in Volume 96;
- Morrison, Ron - Implementing a Family of Distributed Garbage Collectors, in Volume 16;
- Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
- Morrow, Yvonne - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
- Moscato, Pablo - Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray Data, in Volume 38;
- The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction, in Volume 38;
- Moskwa, Sam - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
- Mossakowski, Till - Heterogeneously Structured Ontologies - Integration, Connection, and Refinement, in Volume 90;
- Motahari-Nezhad, Hamid Reza - ServiceMosaic Project: Modeling, Analysis and Management of Web Services Interactions, in Volume 53;
- Motoyoshi, Masahiro - Clustering Stream Data by Regression Analysis, in Volume 32;
- Motroen, Lasse - Towards a Definition and Model for Metadata File Systems, in Volume 74;
- Moulder, Peter - Cobweb : A Constraint-Based WEB Browser, in Volume 16;
- Layout of Bayesian Networks, in Volume 38;
- Mousset, Eric C. - The Open Source Singularity: A Postmodernist View, in Volume 37;
- Moyle, Michael - The Design and Evaluation of a Flick Gesture for 'Back' and 'Forward' in Web Browsers, in Volume 18;
- Mu, Yi - A Secure Mental Poker Protocol over the Internet, in Volume 21;
- Mitigating Phishing with ID-based Online/Offline Authentication, in Volume 81;
- Muecke, Nial - An Argument Structure Abstraction for Bayesian Belief Networks: Just Outcomes in On-line Dispute Resolution, in Volume 67;
- Mueller-Tomfelde, Christian - Explicit Task Representation based on Gesture Interaction, in Volume 57;
- Mueller, Wolfgang - Enhancing the Visualization Process with Principal Component Analysis to Support the Exploration of Trends, in Volume 60;
- Muguerza, Javier - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87;
- Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
- Mui, Y.C. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
- Muir, Peter - Transforming learning of programming: a mentoring project, in Volume 78;
- Mujuni, Egbert - Parameterized Complexity of the Clique Partition Problem, in Volume 77;
- Munro, Callum - Using Machinima to Promote Computer Science Study, in Volume 93;
- Munro, Dave - Implementing a Family of Distributed Garbage Collectors, in Volume 16;
- Munro, David - A Domain Specific Language for Execution Profiling and Regulation, in Volume 91;
- Munro, David S. - Easing the Transition: A Collaborative Learning Approach, in Volume 95;
- Garbage Collection for Storage-Oriented Clusters, in Volume 26;
- Muramatsu, D. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
- Murata, Tadao - Modelling and Simulation of Routing Protocol for Mobile Ad Hoc Networks Using Coloured Petri Nets, in Volume 12;
- Murdaca, Clara - A Relational Account of Objects, in Volume 48;
- Murdoch, John - Measuring Safety: Applying PSM to the System Safety Domain, in Volume 33;
- Murga, Leonel F. - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
- Murnane, John S. - An Empirical Study of Junior Secondary Students' Expression of Algorithms in Natural Language, in Volume 8;
- Teaching Teaching with Information Technology, in Volume 23;
- Murphy, Eamonn - Segregated Failures Model for Availability Evaluation of Fault-Tolerant Systems, in Volume 48;
- Murray, Alex - PULSE: a Pluggable User-space Linux Security Environment paper, in Volume 81;
- Murray, Colin - A User-based Evaluation of Skeletal Animation Techniques in Graph Interaction, in Volume 45;
- Graph Interaction through Force-Based Skeletal Animation, in Volume 35;
- Visualisation of Satisfiability using the Logic Engine, in Volume 45;
- Murray, D. Wayne - Mining Medical Specialist Billing Patterns for Health Service Management, in Volume 87;
- Murray, Iain - A Computing Education Vision for the Sight Impaired, in Volume 30;
- Murray, Leesa - An Approach to Specifying Software Frameworks, in Volume 26;
- Murthy, Sudarshan - Putting Integrated Information in Context: Superimposing Conceptual Models with SPARCE, in Volume 31;
- Murty, James - Implementing Role Based Access Control for Federated Information Systems on the Web, in Volume 21;
- Musial, Benjamin - Application of Focus + Context to UML, in Volume 24;
- Muthuvelu, Nithiapidary - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
- Myers, Trina S. - Supporting Coral Reef Ecosystems Research through Modelling Re-usable Ontologies, in Volume 90;
- The Semantic Reef: Managing Complex Knowledge to Predict Coral Bleaching on the Great Barrier Reef, in Volume 68;
- Myller, Niko - Con�ictive animations as engaging learning tools, in Volume 88;
Top of ListN - Naemura, Masahide - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
- Nagamochi, Hiroshi - Minimum Cost Source Location Problem with Local 3-Vertex-Connectivity Requirements, in Volume 41;
- Nagappan, Rajehndra - A Graph Based Model for Navigating Visualisation, in Volume 2;
- Nagarajan, Srivalli - Towards understanding the non-technical work experiences of recent Australian information technology graduates, in Volume 78;
- Nagasaki, Masao - Integrating Biopathway Databases for Large-scale Modeling and Simulation, in Volume 29;
- Nagashima, Kan - A Wearable Fatigue Monitoring System - Application of Human-Computer Interaction Evaluation, in Volume 50;
- Naghdy, Fazel - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
- Nagra, Jasvir - A Functional Taxonomy for Software Watermarking, in Volume 4;
- Tamper-proofing Software Watermarks, in Volume 32;
- Naik, Ganesh R. - Hand gestures for HCI using ICA of EMG, in Volume 56;
- Naish, Lee - A Program Transformation for Debugging Haskell 98, in Volume 16;
- Approximating the Success Set of Logic Programs Using Constrained Regular Types, in Volume 16;
- Nakamura, Kensuke - Toward Building Grid Applications in Bioinformatics, in Volume 54;
- Nakamura, Masahide - Characterizing Dynamics of Information Leakage in Security-Sensitive Software Process, in Volume 44;
- Nakanishi, Takafumi - Visualization of Music Impression in Facial Expression to Represent Emotion, in Volume 53;
- Nakayama, Minoru - Assessing Usability for Input Operation using Frequency Components of Eye Movements, in Volume 93;
- System Usability Evaluation for Input Operation using Oculo-motors, in Volume 64;
- Nakazawa, Koji - Type Checking and Inference for Polymorphic and Existential Types, in Volume 94;
- Nakazono, Nagayoshi - NeL2: Network Drawing Tool for Handling Layered Structured Network Diagram, in Volume 60;
- Nam, Ki-Chol - Visual Narratives: The Essential Role of Imagination in the Visualization Process, in Volume 60;
- Nascimento, Hugo A. D. do - The Metro Map Layout Problem, in Volume 35;
- Natsev, Apostol (Paul) - Aggregate Predicate Support in DBMS, in Volume 5;
- Natwichai, Juggapong - A Reconstruction-based Algorithm for Classification Rules Hiding, in Volume 49;
- Data Reduction Approach for Sensitive Association Classification Rule Hiding, in Volume 75;
- Nayak, Abhaya - Approaches for Semantic Interoperability between Domain Ontologies, in Volume 72;
- DASMAS - Dialogue based Automation of Semantic interoperability in Multi Agent Systems, in Volume 58;
- Nayak, Richi - A Case Study of Failure Mode Analysis with Text Mining Methods, in Volume 84;
- Clustering and Classification of Maintenance Logs using Text Data Mining, in Volume 87;
- Combining Structure and Content Similarities for XML Document Clustering, in Volume 87;
- Data Mining For Lifetime Prediction of Metallic Components, in Volume 61;
- Data Mining in Conceptualising Active Ageing, in Volume 61;
- PCITMiner- Prefix-based Closed Induced Tree Miner for finding closed induced frequent subtrees, in Volume 70;
- Temporal Pattern Matching for the Prediction of Stock Prices, in Volume 84;
- The Use of Various Data Mining and Feature Selection Methods in the Analysis of a Population Survey Dataset, in Volume 84;
- Ndukwu, Ukachukwu - Reasoning about a Distributed Probabilistic System, in Volume 94;
- Necasky, Martin - Reverse Engineering of XML Schemas to Conceptual Diagrams, in Volume 96;
- XSEM - A Conceptual Model for XML, in Volume 67;
- Nee, A.Y.C. - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
- Nelson, Chris - Game/Music Interaction - An Aural Interface for Immersive Interactive Environments, in Volume 64;
- Nepal, Surya - A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases, in Volume 5;
- Role of Edge Detection in Video Semantics, in Volume 22;
- Nesbitt, Keith - Multi-sensory Game Interface Improves Player Satisfaction but not Performance, in Volume 76;
- Nesbitt, Keith V. - Developing Gestalt-based Design Guidelines for Multi-sensory Displays, in Volume 57;
- Identifying risks for cross-disciplinary higher degree research students, in Volume 78;
- Modelling Human Perception to Leverage the Reuse of Concepts across the Multi-sensory Design Space, in Volume 53;
- Modelling the Multi-Sensory Design Space, in Volume 9;
- The Gestalt Principles of Similarity and Proximity Apply to Both the Haptic and Visual Grouping of Elements, in Volume 64;
- Using Guidelines to assist in the Visualisation Design Process, in Volume 45;
- Neuhauser, Markus - Nonparametric Approaches to Detecting Differentially Expressed Genes in Replicated Microarray Experiments, in Volume 29;
- Neumann, Gunter - Mining Web Snippets to Answer List Questions, in Volume 84;
- Neumann, Gustaf - On the Correlation between Process Model Metrics and Errors, in Volume 83;
- Neumayr, Bernd - Multi-Level Domain Modeling with M-Objects and M-Relationships, in Volume 96;
- Neverov, Gregory - Towards a Fully-reflective Meta-programming Language, in Volume 38;
- Nevison, Chris - Using a Maze Case Study to Teach Object-Oriented Programming and Design Patterns, in Volume 30;
- Newby, Steve - Extending a Persistent Object Framework to Enhance Enterprise Application Server Performance, in Volume 5;
- Newman, Ian - Open Ended Group Projects a 'Tool' for More Effective Teaching, in Volume 20;
- Ng, S. K. - Clustering Replicated Microarray Data via Mixtures of Random Effects Models for Various Covariance Structures, in Volume 73;
- Ng, S. W. - Clustering Replicated Microarray Data via Mixtures of Random Effects Models for Various Covariance Structures, in Volume 73;
- Ng, See-Kiong - From Informatics to Bioinformatics, in Volume 19;
- Whole-Genome Functional Classification of Genes by Latent Semantic Analysis on Microarray Data, in Volume 29;
- Ng, Vincent - Enumerating XML Data for Dynamic Updating, in Volume 39;
- Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries, in Volume 63;
- Ng, Wee-Keong - CrystalBall : A Framework for Mining Variants of Association Rules, in Volume 17;
- Discovering Frequent Sets from Data Streams with CPU Constraint, in Volume 70;
- Ngai, Alwin C.H. - Enhanced Word-Based Block-Sorting Text Compression, in Volume 4;
- Nguyen, Anh - A BDI Agent Architecture for Dialogue Modelling and Coordination in a Smart Personal Assistant, in Volume 57;
- Document Classification via Structure Synopses, in Volume 17;
- Nguyen, Anthony - Characterizing Image Properties for Digital Mammograms, in Volume 97;
- Nguyen, DucDung - Knowledge Visualization in Hepatitis Study, in Volume 60;
- Nguyen, Minh H. - On the Non-existence of Even Degree Graphs with Diameter 2 and Defect 2, in Volume 77;
- Nguyen, Peter - A Domain Specific Language for Execution Profiling and Regulation, in Volume 91;
- Nguyen, Philip H. P. - A Formalization of Subjective and Objective Time Ontologies, in Volume 85;
- Nguyen, Phung Hua - Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading, in Volume 38;
- Strength Reduction for Loop-Invariant Types, in Volume 26;
- Nguyen, Phuong - Characterizing Image Properties for Digital Mammograms, in Volume 97;
- Nguyen, Quang Vinh - Improvements of Space-Optimized Tree for Visualizing and Manipulating Very Large Hierarchies, in Volume 22;
- Visualising File-Systems Using ENCCON Model, in Volume 36;
- Nguyen, Son N. - A Further Study in the Data Partitioning Approach for Frequent Itemsets Mining, in Volume 49;
- Graph Mining based on a Data Partitioning Approach, in Volume 75;
- Nguyen, T. A. - An Approach to Vickrey-based Resource Allocation in the Presence of Monopolistic Sellers, in Volume 99;
- Nguyen, Thai D. - Ontology Evolution for Customer Services, in Volume 90;
- Ni, Jiarui - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
- Ni, Wei - Update XML Data by Using Graphical Languages, in Volume 83;
- Nicholson, Ann E. - Take Heart II: A Modular Bayesian Decision Support System, in Volume 68;
- Nicholson, Mark - Safety Assurance Contracts for Integrated Modular Avionics, in Volume 33;
- Nicolau�Jr., Dan V. - A New Program to Compute the Surface Properties of Biomolecules, in Volume 19;
- Nicolau Jr., Dan V. - Towards a Theory of Protein Adsorption: Predicting the Adsorption of Proteins on Surfaces via a Piecewise Linear Model, in Volume 29;
- Nicolau�Sr., Dan V. - A New Program to Compute the Surface Properties of Biomolecules, in Volume 19;
- Nicolau, Dan V. - Towards a Theory of Protein Adsorption: Predicting the Adsorption of Proteins on Surfaces via a Piecewise Linear Model, in Volume 29;
- Niedieck, S. - Analysing MEG-Data by a Combination of Different Neural Networks, in Volume 19;
- Nielsen, Benny K. - An efficient solution method for relaxed variants of the nesting problem, in Volume 65;
- Nieto, Juan Manuel Gonzalez - Strong Designated Verifier Signature in a Multi-user Setting, in Volume 98;
- Nieto, Juanma Gonzalez - Provably Secure Key Exchange: an Engineering Approach, in Volume 21;
- Nieuwenhuis, Adrienne L. - Application Rates to Undergraduate Programs in Information Technology in Australian Universities, in Volume 4;
- Nikandros, George - Calculating Train Braking Distance, in Volume 3;
- COTS - Size Does Matter, in Volume 47;
- Measuring Railway Signals Passed At Danger, in Volume 86;
- Nikolov, Nikola - Using Spring Algorithms to Remove Node Overlapping, in Volume 45;
- Nikolov, Nikola S. - Layered Drawings of Directed Graphs in Three Dimensions, in Volume 45;
- Nilsen, Trond - Interaction With Partially Transparent Hands And Objects, in Volume 40;
- Nimbhorkar, Prajakta - Longest Paths in Planar DAGs in Unambiguous Logspace, in Volume 94;
- Nisar, Azhar - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
- Nishio, Shojiro - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
- Nishizeki, Takao - Rectangle-of-Influence Drawings of Four-Connected Plane Graphs, in Volume 45;
- Noah, Shahrul Azman - Extracting and Modeling the Semantic Information Content of Web Documents to Support Semantic Document Retrieval, in Volume 96;
- Noble, James - A Case for Iconic Icons, in Volume 50;
- A Case Study of Cartoon Visualisation Using AspectJ, in Volume 24;
- A Lightweight Web-Based Case Tool for UML Class Diagrams, in Volume 18;
- A Taxonomic Analysis of User-Interface Metaphors in the Microsoft Office Project Gallery, in Volume 40;
- A Web User Interface For An Interactive Software Repository, in Volume 28;
- Attack of the Clones, in Volume 13;
- Clicki: A Framework for Light-weight Web-based Visual Applications, in Volume 40;
- Delegation Diagrams: Visual Support for the Development of Object-Oriented Designs, in Volume 28;
- Essential Use Cases and Responsibility in Object-Oriented Development, in Volume 4;
- From Pushing Buttons to Play and Progress: Value and Interaction in Fable, in Volume 50;
- Icons R Icons, in Volume 18;
- InspectJ : Program Monitoring for Visualisation Using AspectJ, in Volume 16;
- Less Extreme Programming, in Volume 30;
- Metaphor and Metonymy in Object-Oriented Design Patterns, in Volume 4;
- Patterns for Essential Use Case Bodies, in Volume 13;
- Persuasive Interaction for Collectivist Cultures, in Volume 50;
- Postmodern Prospects for Conceptual Modelling, in Volume 53;
- Program Visualisation for Visual Programs, in Volume 7;
- Reflections on CRC Cards and OO Design, in Volume 10;
- Sokoban: A System Object Case Study, in Volume 10;
- Spreadsheet structure inspection using low level access and visualisation, in Volume 18;
- Spreadsheet Visualisation to Improve End-user Understanding, in Volume 24;
- Teaching the Evaluation of Object-Oriented Designs, in Volume 20;
- The Semiotics of User Interface Redesign, in Volume 40;
- Using a System of Tutorials and Groups to Teach User Interface Design, in Volume 42;
- Using Software Visualisation to Enhance Online Component Markets, in Volume 35;
- Visualising 1,051 Visual Programs Module Choice and Layout in the Nord Modular Patch Language, in Volume 9;
- XML Database Support for Program Trace Visualisation, in Volume 35;
- Noble, Nathan - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
- Nocke, Thomas - A Framework for Visual Data Mining of Structures, in Volume 48;
- Enhancing the Visualization Process with Principal Component Analysis to Support the Exploration of Trends, in Volume 60;
- Nolan, M. - An Evaluation of Web Services in the Design of a B2B Application, in Volume 26;
- Norcross, Stuart - Implementing a Family of Distributed Garbage Collectors, in Volume 16;
- Notoatmodjo, Gilbert - Passwords and Perceptions, in Volume 98;
- Nouali, Nadia - A Two-Phase Commit Protocol for Mobile Wireless Environment, in Volume 39;
- Novins, Kevin - Fluid Sketching of Directed Graphs, in Volume 50;
- Nowak, Chris - Mephisto I. - Towards a Formal Theory, in Volume 72;
- Nussbaum, Doron - Calculating the Meeting Point of Scattered Robots on Weighted Terrain Surfaces, in Volume 41;
- Nutt, Werner - Condensative Stream Query Language for Data Streams, in Volume 63;
- Nymeyer, Albert - Formal Model of a Protocol Converter, in Volume 94;
Top of ListO - O'Brien, Mia B. - Identifying Salient Learning Experiences: A Scenario-Based Method Enabling Industry-University Partnerships in IT, in Volume 20;
- O'Dea, Damian - Dealing with Geospatial Information in the Semantic Web, in Volume 58;
- O'Hare, G. M. P. - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
- O'Rourke, Maureen - The Introduction of New Technologies - New Possibilities, Partnerships and Power Relationships , in Volume 34;
- Oberweis, Andreas - Measuring Similarity between Semantic Business Process Models, in Volume 67;
- Odgers, Grant - Evaluating Swiftpoint as a Mobile Device for Direct Manipulation Input, in Volume 64;
- Oertel, Karina - Emotions in HCI - An Affective E-Learning System, in Volume 56;
- Ofoghi, Bahadorreza - A Semantic Approach to Boost Passage Retrieval Effectiveness for Question Answering, in Volume 48;
- Ogawa, Michael - BiblioViz: A System for Visualizing Bibliography Information, in Volume 60;
- Ohbo, Nobuo - The Complex Polyhedra Technique: An Index Structure for High-Dimensional Space, in Volume 5;
- Ohiwa, Hajime - Roles of the Teacher in Media Literacy Education, in Volume 23;
- Ohrimenko, Olga - Modelling for Lazy Clause Generation, in Volume 77;
- Ohta, Manabu - An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories, in Volume 39;
- Okamoto, Yoshio - Fast Exponential-Time Algorithms for the Forest Counting in Graph Classes, in Volume 65;
- Oliveira, Stanley R. M. - Foundations for an Access Control Model for Privacy Preservation in Multi-Relational Association Rule Mining, in Volume 14;
- Privacy Preserving Frequent Itemset Mining, in Volume 14;
- Oliver, Dave - This Course Has A Bloom Rating Of 3.9, in Volume 30;
- Omondi, Amos - Embedding of Fault-Tolerant Trees in the Josephus Cube, in Volume 6;
- Omote, Hiroki - Method for Drawing Intersecting Clustered Graphs and Its Application to Web Ontology Language, in Volume 60;
- Ondrechen, Mary Jo - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
- Ong, Hwee-Leng - Feature Space Transformation and Decision Results Interpretation, in Volume 19;
- Ong, Kenneth - Mesh Simplification using Ellipsoidal Schema for Isotropic Quantization of Face-Normal Vectors, in Volume 60;
- Ong, Kok-Leong - CrystalBall : A Framework for Mining Variants of Association Rules, in Volume 17;
- Discovering Frequent Sets from Data Streams with CPU Constraint, in Volume 70;
- Safely Delegating Data Mining Tasks, in Volume 61;
- Ong, S.K. - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
- Ong, Twee-Hee - BLAST++ : A Tool for BLASTing Queries in Batches, in Volume 19;
- Ong, Yew-Soon - Whole-Genome Functional Classification of Genes by Latent Semantic Analysis on Microarray Data, in Volume 29;
- Ono, Hirotaka - Graph Classes and the Complexity of the Graph Orientation Minimizing the Maximum Weighted Outdegree, in Volume 77;
- Graph Orientation Algorithms to Minimize the Maximum Outdegree, in Volume 51;
- Ooi, Beng Chin - B-trees: Bearing Fruits of All Kinds, in Volume 5;
- BLAST++ : A Tool for BLASTing Queries in Batches, in Volume 19;
- Can P2P become a disruptive technology to enterprise data processing?, in Volume 75;
- Ore, Christian-Emil - The CIDOC Conceptual Reference Model - A New Standard for Knowledge Sharing, in Volume 83;
- Orengo, Viviane Moreira - SimEval - A Tool for Evaluating the Quality of Similarity Functions, in Volume 83;
- Orgun, Bhavna - Approaches for Semantic Interoperability between Domain Ontologies, in Volume 72;
- DASMAS - Dialogue based Automation of Semantic interoperability in Multi Agent Systems, in Volume 58;
- Orgun, Mehmet A. - A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors, in Volume 16;
- Compiled Visual Programs by VisPro, in Volume 36;
- Towards Security Labelling, in Volume 48;
- Using Graph Grammer to Implement Global Layout for a Visual Programming Language Generation System, in Volume 11;
- Visual Language Semantics Specification in the VisPro System, in Volume 22;
- Orlowska, Maria E. - A Further Study in the Data Partitioning Approach for Frequent Itemsets Mining, in Volume 49;
- A Reconstruction-based Algorithm for Classification Rules Hiding, in Volume 49;
- Customizing Internal Activity Behaviour for Flexible Process Enforcement, in Volume 27;
- Data Flow and Validation in Workflow Modelling, in Volume 27;
- Graph Mining based on a Data Partitioning Approach, in Volume 75;
- On Aggregation Issues in Spatial Data Management, in Volume 5;
- Recency-Based Collaborative Filtering, in Volume 49;
- Ortuno, Fernando Martinez - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
- Osawa, Ryo - Puzzle Generators and Symmetric Puzzle Layout, in Volume 45;
- Osman, Deanna - Using Corpus Analysis to Inform Research into Opinion Detection in Blogs, in Volume 70;
- Osman, Deanna J. - Opinion Search in Web Logs, in Volume 63;
- Ou, Yuming - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
- Oudshoorn, Michael J. - AdJava - Automatic Distribution of Java Applications, in Volume 4;
- Employing Hierarchical Federation Communities in the Virtual Ship Architecture, in Volume 4;
- Ouyang, Hua - A New Lip Feature Representation Method for Video-based Bimodal Authentication, in Volume 57;
- Ovchinnikova, Ekaterina - Aspects of Automatic Ontology Extension: Adapting and Regeneralizing Dynamic Updates, in Volume 72;
- Extraction, evaluation and integration of lexical-semantic relations for the automated construction of a lexical ontology, in Volume 85;
- Over, Andrew - Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU, in Volume 62;
- Oviatt, Sharon - Toward Adaptive Information Fusion in Multimodal Systems, in Volume 57;
- Ozgul, Fatih - Mining for offender group detection and story of a police operation, in Volume 70;
- Ozolins, Jason - Integrating The MACHO Data-set with the Virtual Observatory, in Volume 44;
- Ozols, Maris - Access Control Models and Security Labelling, in Volume 62;
- Ozols, Maris A. - Combining Logics for Modelling Security Policies, in Volume 38;
Top of ListP - Paar, Alexander - A Pluggable Architectural Model and a Formally Specified Programming Language Independent API for an Ontological Knowledge Base Server, in Volume 58;
- Padgham, Lin - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26;
- Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids, in Volume 4;
- Experiences in Teaching Computing Theory via Aspects of Problem-based Learning, in Volume 20;
- Representation and Reasoning for Goals in BDI Agents, in Volume 4;
- Padmanabhan, Vineet - Process Modelling: The Deontic Way, in Volume 53;
- Using a Temporal Constraint Network for Business Process Execution, in Volume 49;
- Paganelli, F. - Automating XML document Transformations: A conceptual modelling based approach, in Volume 31;
- Page, John - A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios, in Volume 32;
- Pagnucco, Maurice - Utilising Ontological Structure for Reasoning with Preferences, in Volume 90;
- Pai, Tun-Wen - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
- Pailthorpe, Bernard - 3D Visualisation of Tumours and Blood Vessels in Human Liver, in Volume 22;
- Grid services for e-archaeology, in Volume 82;
- High Resolution Scalable Displays: Manufacturing and Use, in Volume 35;
- Semi-Automatic Feature Delineation In Medical Images, in Volume 35;
- Paine, Lance - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
- Palaniswam, Marimuthu - Hand gestures for HCI using ICA of EMG, in Volume 56;
- Palmer, Doug - Applying Enterprise Architectures and Technology to the Embedded Devices Domain, in Volume 21;
- Palopoli, Luigi - A Framework for Improving Protein Structure Predictions by Teamwork, in Volume 19;
- Palsberg, Jens - Register Allocation via Coloring of Chordal Graphs, in Volume 65;
- Panach, Ignacio - An Abstract Interaction Model for a MDA Software Production Method, in Volume 83;
- Pang, Y. - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
- Pankratius, Victor - A Formal Foundation for Workflow Composition, Workflow View Definition, and Workflow Normalization based on Petri Nets, in Volume 43;
- Pantelic, R. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
- Papadopoulos, Yiannis - A Method and Tool Support for Model-based Semi-automated Failure Modes and Effects Analysis of Engineering Designs, in Volume 47;
- Parameswaran, N. - Media Streaming Synchronisation and Video Interaction : A Survey, in Volume 22;
- Survey of Sports Video Analysis: Research Issues and Applications, in Volume 36;
- Paris, Cecile - Explicit Task Representation based on Gesture Interaction, in Volume 57;
- Park, Mira - Automatic Extraction of Lung Boundaries by a Knowledge-Based Method, in Volume 2;
- Detection and Measurement of Hilar Region in Chest Radiograph, in Volume 22;
- Detection of Abnormal Texture in Chest X-rays with Reduction of Ribs, in Volume 36;
- Texture Classification using Multi-Scale Scheme, in Volume 36;
- Park, Sung Sik - Using Formal Concept Analysis with an Incremental Knowledge Acquisition System for Web Document Management, in Volume 48;
- Parker, Brian - Three-dimensional Medical Image Segmentation Using a Graph-Theoretic Energy-Minimisation Approach, in Volume 11;
- Variational Segmentation and PCA Applied to Dynamic PET Analysis, in Volume 22;
- Parker, David - A Method and Tool Support for Model-based Semi-automated Failure Modes and Effects Analysis of Engineering Designs, in Volume 47;
- Parker, Kris - Determining Component Reliability Using a Testing Index, in Volume 4;
- Parnas, David L. - Segregated Failures Model for Availability Evaluation of Fault-Tolerant Systems, in Volume 48;
- Parnis, James - Exploiting FPGA Concurrency to Enhance JVM Performance, in Volume 26;
- Parry, David - A Fuzzy Ontology for Medical Document Retrieval, in Volume 32;
- Parsa, Mahdi - Computing Nash Equilibria Gets Harder: New Results Show Hardness Even for Parameterized Complexity, in Volume 94;
- Parsons, Dale - Parson's Programming Puzzles: A Fun and Effective Learning Tool for First Programming Courses, in Volume 52;
- Parsons, Jeffrey - An Experimental Evaluation of Property Precedence in Conceptual Modelling, in Volume 31;
- Ontological Semantics for the Use of UML in Conceptual Modeling, in Volume 83;
- Paschos, Vangelis Th. - Greedy algorithms for on-line set-covering and related problems, in Volume 51;
- Pascoe, Robert - Experiences from a Wireless-enabled Tablet Classroom, in Volume 42;
- Passig, David - A Model for Training Future Science Teachers to Master the Cognitive Skill Melioration with ICT, in Volume 23;
- Pastor, Oscar - An Abstract Interaction Model for a MDA Software Production Method, in Volume 83;
- Pasupathinathan, Vijayakrishnan - Formal Analysis of Card-based Payment Systems in Mobile devices, in Volume 54;
- Formal Security Analysis of Australian E-passport Implementation, in Volume 81;
- Patig, Susanne - A Practical Guide to Testing the Understandability of Notations, in Volume 79;
- Patrick, Jon - An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology, in Volume 68;
- Extracting Semantics in a Clinical Scenario, in Volume 68;
- Metonymic and Holonymic roles and Emergent Properties in the SNOMED CT Ontology, in Volume 72;
- Scamseek - A Language Technology Project Fulfilling Research Objectives with Industrial Obligations, in Volume 46;
- Patrickson, Margaret - GP Attitudes towards Using HI Systems in Their Professional Role, in Volume 97;
- Patterson, Julia - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
- Pattison, Tim - Information Visualisation using Composable Layouts and Visual Sets, in Volume 9;
- Rapid Assembly and Deployment of Domain Visualisation Solutions, in Volume 9;
- View Coordination Architecture for Information Visualisation, in Volume 9;
- Patton, Mary Anne - User Interface Requirements for Authentication of Communication, in Volume 18;
- Pau, Cristian - XAL: An Algebra For XML Query Optimization, in Volume 5;
- Pauling, Joel W. - Review of Work Experience in a Bachelor of Information Technology, in Volume 66;
- Pavlovski, Christopher J. - Non-Functional Requirements in Business Process Modeling, in Volume 79;
- Payan, Donald G. - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
- Paynter, John - Adventure Cycles A Software Engineering Approach, in Volume 30;
- Pearce, David - Edge-Selection Heuristics for Computing Tutte Polynomials, in Volume 94;
- Pears, Arnold - Differing Ways that Computing Academics Understand Teaching, in Volume 66;
- Five Myths of Assessment, in Volume 30;
- Learning educational research methods through collaborative research: the PhICER initiative, in Volume 78;
- Multi-Institutional Teaching Communities in Computer Education, in Volume 52;
- Qualitative Research Projects in Computing Education Research: An Overview, in Volume 52;
- What's the problem? Teachers' experience of student learning successes and failures, in Volume 88;
- Pears, Russel - Rare Association Rule Mining via Transaction Clustering, in Volume 87;
- Pedersen, Dennis - A Powerful and SQL-Compatible Data Model and Query Language for OLAP, in Volume 5;
- Pedersen, Torben Bach - A Powerful and SQL-Compatible Data Model and Query Language for OLAP, in Volume 5;
- Peixoto, Paulo - Nuisance Free Recognition of Hand Postures Over a Tabletop Display, in Volume 56;
- Pellegrino, Francois - Accuracy Estimation With Clustered Dataset, in Volume 61;
- Pellens, Bram - Conceptual Modeling for Virtual Reality, in Volume 83;
- Peltomaki, Mia - Improving mathematics and programming education - the IMPEd initiative, in Volume 88;
- Why Complicate Things? Introducing Programming in High School Using Python, in Volume 52;
- Pendragon, Tane - Path-Planning by Tessellation of Obstacles, in Volume 16;
- Penev, Alex - Shallow NLP techniques for Internet Search, in Volume 48;
- Peng, Kun - A Range Test Secure in the Active Adversary Model, in Volume 68;
- Five Sealed-bid Auction Models, in Volume 21;
- Peng, Shietung - Metacube - A New Interconnection Network for Large Scale Parallel Systems, in Volume 6;
- Peramunetilleke, Desh - Currency Exchange Rate Forecasting From News Headlines, in Volume 5;
- Peres, Yardena - A Grammer View for Editing Structured Documents, in Volume 11;
- Perona, Inigo - Evaluation of Malware clustering based on its dynamic behaviour, in Volume 87;
- Service-independent payload analysis to improve intrusion detection in network traffic, in Volume 87;
- Perry, Peter - Fast Segmentation of Large Images, in Volume 16;
- Persson, Mia - Approximate Clustering of Fingerprint Vectors with Missing Values, in Volume 41;
- On the Approximability of Maximum and Minimum Edge Clique Partition Problems, in Volume 51;
- Pervaiz, Ijaz - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
- Pessoa, Marcos Clayton Fernandes - Internet Projects - International Cooperation, in Volume 23;
- Petre, Marian - Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52;
- Measuring Improvement in Latent Semantic Analysis-Based Marking Systems: Using a Computer to Mark Questions about HTML, in Volume 66;
- Petrucci, Laure - Towards Formal Specification and Analysis of Avionics Mission Systems, in Volume 12;
- Pettersen, Oystein - Grid services for e-archaeology, in Volume 82;
- Pfitzner, Darius - A Unified Taxonomic Framework for Information Visualization, in Volume 24;
- Determining Pattern Element Contribution in Medical Datasets, in Volume 68;
- Pham, Binh - A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights, in Volume 38;
- Extensible Detection and Indexing of Highlight Events in Broadcasted Sports Video, in Volume 48;
- Key Challenges in Software Internationalisation, in Volume 32;
- Performance Factors Analysis of a Wavelet-based Watermarking Method, in Volume 44;
- Recovery of Watermark Using Differential Affine Motion Estimation, in Volume 44;
- Pham, Ha Hai - Intelligent Agents for Automated One-to-Many e-Commerce Negotiation, in Volume 4;
- Pham, Hai Nam - An Approach to Vickrey-based Resource Allocation in the Presence of Monopolistic Sellers, in Volume 99;
- Pham, Quan - Commitment Issues in Delegation Process, in Volume 81;
- Pham, Tuan D. - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
- Quantification of Neural Images using Grey Difference, in Volume 73;
- Phelps, Ted - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
- Philippi, Stephan - Life-Cycle Inheritance in Concurrent Object-Oriented Systems, in Volume 12;
- Phillipps, Margot - A Perspective on the International Olympiad in Informatics for CS educators, in Volume 95;
- Phillips, C. - What Makes a Good User Interface Pattern Language?, in Volume 28;
- Phillips, Chris - In Support of User Interface Design in the Rational Unified Process, in Volume 7;
- Phillips, James - Human Visual Perception of Region Warping Distortions, in Volume 48;
- Phillips, Malcolm - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
- Phillips, Matthew - An Architecture for Multi-View Information Overlays, in Volume 35;
- Information Visualisation using Composable Layouts and Visual Sets, in Volume 9;
- Interaction Modes for Augmented Reality Visualization, in Volume 9;
- Keg Master : a Graph-Aware Visual Editor for 3D Graphs, in Volume 18;
- Rapid Assembly and Deployment of Domain Visualisation Solutions, in Volume 9;
- View Coordination Architecture for Information Visualisation, in Volume 9;
- Phua, Clifton - Adaptive Spike Detection for Resilient Data Stream Mining, in Volume 70;
- Phung, Dinh - Indoor Location Prediction Using Multiple Wireless Received Signal Strengths, in Volume 87;
- Phung, Dinh Quoc - Preference Networks: Probabilistic Models for Recommendation Systems, in Volume 70;
- Phung, Nhan - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
- Piccardi, Massimo - Face and Body Gesture Recognition for a Vision-Based Multimodal Analyzer, in Volume 36;
- Observer Annotation of Affective Display and Evaluation of Expressivity: Face vs. Face-and-Body, in Volume 56;
- Pickering, Mark - Unsupervised band removal leading to improved classification accuracy of hyperspectral images, in Volume 48;
- Piekarski, Wayne - Comparison of techniques for mixed-space collaborative navigation, in Volume 93;
- Evaluation of User Satisfaction and Learnability for Outdoor Augmented Reality Gaming, in Volume 50;
- Hand Tracking For Low Powered Mobile AR User Interfaces, in Volume 40;
- Lightweight User Interfaces for Watch Based Displays, in Volume 40;
- Outdoor Augmented Reality Gaming on Five Dollars a Day, in Volume 40;
- Public and Private Workspaces on Tabletop Displays, in Volume 76;
- The Tinmith System - Demonstrating New Techniques for Mobile Augmented Reality Modelling, in Volume 7;
- User Evaluation of God-like Interaction Techniques, in Volume 76;
- Pieprzyk, Josef - Formal Analysis of Card-based Payment Systems in Mobile devices, in Volume 54;
- Formal Security Analysis of Australian E-passport Implementation, in Volume 81;
- Pilgrim, C. J. - Trends in Sitemap Designs - A Taxonomy and Survey, in Volume 64;
- Pineda-Villavicencio, Guillermo - On the Non-existence of Even Degree Graphs with Diameter 2 and Defect 2, in Volume 77;
- Pirzada, Asad - Asad Pirzada, Ryan Wishart, Marius Portmann and Jadwiga Indulska, in Volume 91;
- HOVER: Hybrid On-demand Distance Vector Routing for Wireless Mesh Networks, in Volume 74;
- Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol, in Volume 62;
- Pirzada, Asad Amir - Dependable Dynamic Source Routing without a Trusted Third Party, in Volume 38;
- Establishing Trust In Pure Ad-hoc Networks, in Volume 26;
- Kerberos Assisted Authentication in Mobile Ad-hoc Networks, in Volume 26;
- Pisan, Yusuf - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
- Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20;
- Pitt, Ellen - The Use of Various Data Mining and Feature Selection Methods in the Analysis of a Population Survey Dataset, in Volume 84;
- Plank, Ashley - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61;
- An efficient hash-based algorithm for minimal k-anonymity, in Volume 74;
- Privacy-aware Access Control with Generalization Boundaries, in Volume 91;
- Plimmer, Beryl - A Pen-based Paperless Environment for Annotating and Marking Student Assignments, in Volume 50;
- Beautifying Sketching-based Design Tool Content: Issues and Experiences, in Volume 40;
- Computer-Aided Sketching to Capture Preliminary Design, in Volume 7;
- Connector Semantics for Sketched Diagram Recognition, in Volume 64;
- Sketching ER Diagrams, in Volume 93;
- Pokorny, Jaroslav - UserMap : an Adaptive Enhancing of User-Driven XML-to-Relational Mapping Strategies, in Volume 75;
- Pollard, Janelle - A Reference Architecture for Instructional Educational Software, in Volume 46;
- Pollett, Chris - Circuit Principles and Weak Pigeonhole Variants, in Volume 41;
- Poon, Chung Keung - On-demand Bounded Broadcast Scheduling with Tight Deadlines, in Volume 51;
- Poon, Josiah - A New Evaluation Measure for Imbalanced Datasets, in Volume 87;
- Pope, Bernard - A Program Transformation for Debugging Haskell 98, in Volume 16;
- Pope, Simon - Semantic Constraints for Trust Transitivity, in Volume 43;
- Trust Network Analysis with Subjective Logic, in Volume 48;
- Trust Requirements in Identity Management, in Volume 44;
- Porter, Ron - A Pattern-Based Problem-Solving Process for Novice Programmers, in Volume 20;
- Applying Patterns to Novice Programming Problems, in Volume 13;
- Porter, Ronald - Patterns in Learning to Program - An Experiment?, in Volume 30;
- Porter, Shane R. - Augmenting Image Place AR 3D Interactions for Wearable Computers, in Volume 93;
- Portmann, Marius - Asad Pirzada, Ryan Wishart, Marius Portmann and Jadwiga Indulska, in Volume 91;
- HOVER: Hybrid On-demand Distance Vector Routing for Wireless Mesh Networks, in Volume 74;
- Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol, in Volume 62;
- Pose, Ronald - Human Visual Perception of Region Warping Distortions, in Volume 48;
- Large Object Segmentation with Region Priority Rendering, in Volume 38;
- Potamianos, Gerasimos - Audio-Visual Speech Processing: Progress and Challenges, in Volume 56;
- Audio-Visual Technologies for Lecture and Meeting Analysis inside Smart Rooms, in Volume 56;
- Potanin, Alex - Annotating UI Architecture with Actual Use, in Volume 76;
- Potgieter, B. Christo - Change and Innovation We Expect of ICT Teaching Staff, in Volume 30;
- Pothipruk, Pakornpong - An Optimization for Query Answering on ALC Database, in Volume 49;
- Potika, Katerina - Polygons Labelling of Minimum Leader Length, in Volume 60;
- Potter, John - Flexible Exclusion Control for Composite Objects, in Volume 38;
- Learning Causal Networks from Microarray Data, in Volume 73;
- Powell, Antony - Measuring Safety: Applying PSM to the System Safety Domain, in Volume 33;
- Powell, Daniel - Automatic Derivation of Loop Termination Conditions to Support Verification, in Volume 26;
- Power, James F. - Reveal: A Tool to Reverse Engineer Class Diagrams, in Volume 10;
- Powers, David M.W. - A Unified Taxonomic Framework for Information Visualization, in Volume 24;
- Audio-Visual Speech Recognition Using Red Exclusion and Neural Networks, in Volume 4;
- Automatic Thesaurus Construction, in Volume 74;
- CURIO: A Fast Outlier and Outlier Cluster Detection Algorithm for Large Datasets, in Volume 84;
- Lip Feature Extraction Using Red Exclusion, in Volume 2;
- Measuring Semantic Similarity in the Taxonomy of WordNet, in Volume 38;
- Minors as Miners - Modelling and Evaluating Ontological and Linguistic Learning, in Volume 87;
- Sensor Fusion Weighting Measures in Audio-Visual Speech Recognition, in Volume 26;
- Vision in HCI: Embodiment, Multimodality and Information Capacity, in Volume 56;
- Powers, Kris D. - Teaching Computer Architecture in Introductory Computing: Why? and How?, in Volume 30;
- Prahofer, Herbert - A Component-Based Application Framework for Manufacturing Execution Systems in C# and .NET, in Volume 10;
- Prakash, Edmond C. - A System for Geographical and Spatial Data Exploration on the Internet, in Volume 2;
- Pramudiono, Iko - WEB Community Mining and WEB Log Mining: Commodity Cluster Based Execution, in Volume 5;
- Prasad, Christine - Decoding Doodles: Novice Programmers and Their Annotations, in Volume 66;
- Teaching Introductory Programming to Information Systems and Computing Majors: Is There a Difference?, in Volume 30;
- Prasard, Christine - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
- Prasher, Sham - Multiresolution Amalgamation: Dynamic Spatial Data Cube Generation, in Volume 27;
- Pree, Wolfgang - MUSA-Shadow: Concepts, Implementation and Sample Applications - A Location-Based Service Supporting Multiple Devices, in Volume 10;
- Prekop, Paul - Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom, in Volume 21;
- Price, Keith - Why Computers Will Never Be People, in Volume 37;
- Price, Richard - Concepts for Multimedia Database Exploitation, in Volume 39;
- Volume, Velocity and Variety - Key Challenges for Mining Large Volumes of Multimedia Information, in Volume 87;
- Price, Sara - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
- Prieto, Elena - The Method of Extremal Structure on the k-Maximum Cut Problem, in Volume 41;
- Prinz, Andreas - Operational Semantics of Transactions, in Volume 17;
- Prior, Julia Coleman - Online Assessment of SQL Query Formulation Skills, in Volume 20;
- Proctor, Romina M. J. - Integrating Concrete and Virtual Materials in an Elementary Mathematics Classroom: A Case Study of Success with Fractions, in Volume 8;
- Proper, H. A. - Transformation selection for aptness-based web retrieval, in Volume 39;
- Proper, H.A. - On Utility-based Selection of Architecture-Modelling Concepts, in Volume 43;
- Prost, Jean-Philippe - CORAL : Using Natural Language Generation for Navigational Assistance, in Volume 16;
- Puchinger, Jakob - The Core Concept for 0/1 Integer Programming, in Volume 77;
- Puglisi, Simon J. - Suffix Arrays: What Are They Good For?, in Volume 49;
- Pulo, K. J. - Recursive Space Decompositions in Force-Directed Graph Drawing Algorithms, in Volume 9;
- Pulo, Kevin - Direct Interaction with Large-Scale Display Systems using Infrared Laser tracking Devices, in Volume 24;
- Inclusion Tree Layout Convention : An Empirical Investigation, in Volume 24;
- Pumfrey, David - The HEAT/ACT Preliminary Safety Case: A case study in the use of Goal Structuring Notation, in Volume 47;
- Puonti, Sami - Nalkki-project - tool for plagiarism detection using the web, in Volume 88;
- Puper, J. - ICT and the New Roles of the Teacher in Dutch Secondary Education, in Volume 23;
- Pupunwiwat, Prapassara - Unified Q-ary Tree for RFID Tag Anti-Collision Resolution, in Volume 92;
- Purchase, Helen - The 'Mental Map' versus 'Static Aesthetic' Compromise in Dynamic Graphs : A User Study, in Volume 76;
- Purchase, Helen C. - Graph Drawing Aesthetics and the Comprehension of UML Class Diagrams: An Empirical Study, in Volume 9;
- UML Class Diagram Syntax: An Empirical Study of Comprehension, in Volume 9;
- Purvis, Martin - A Market-based Rule Learning System, in Volume 32;
- Educational Experiences From a Global Software Engineering (GSE) Project, in Volume 30;
- Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory, in Volume 26;
- Information Systems as Distributed Multi-agent Systems, in Volume 43;
- Visualisation and Comparison of Image Collections based on Self-organised Maps, in Volume 32;
- Purvis, Maryam - Educational Experiences From a Global Software Engineering (GSE) Project, in Volume 30;
- Monitoring and Controlling of a Multi-agent Based Workflow System, in Volume 32;
- Towards a multi-lingual workflow system - a practical outlook, in Volume 32;
Top of ListQ - Qadir, M. Abdul - Intelligent Cache Management for Data Grid, in Volume 44;
- Qiu, Ling - Safely Delegating Data Mining Tasks, in Volume 61;
- Qu, Kunbin - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
- Qu, Wei - Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf, in Volume 16;
- Quan, Tho T. - Ontology Evolution for Customer Services, in Volume 90;
- Quek, Francis - Mental Imagery, Language and Gesture: Multimodal Access to Human Communication, in Volume 57;
- Quigley, Aaron J. - 'Powerpoint to the People' : Suiting the Word to the Audience, in Volume 28;
- Large Scale 3D Clustering and Abstraction, in Volume 2;
- Quincy - Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks, in Volume 75;
- Quinn, Aaron - Accepting Manipulation or Manipulating What's Acceptable?, in Volume 37;
- Quinn, Anthony - A Classification Algorithm that Derives Weighted Sum Scores for Insight into Disease, in Volume 97;
- Classification for accuracy and insight: A weighted sum approach, in Volume 70;
- Quinn, Philip - The Effects of Menu Parallelism on Visual Search and Selection, in Volume 76;
- Quirchmayr, Gerald - A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services, in Volume 68;
- Adaptive Learning Environments for CS Education : From AMLE to Live Spaces, in Volume 20;
- Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing, in Volume 21;
- Survivability and Business Continuity Management, in Volume 32;
- The motivation and proposition of a privacy-enhancing architecture for operational databases, in Volume 68;
- Qureshi, Zahid H. - A Review of Accident Modelling Approaches for Complex Socio-Technical Systems, in Volume 86;
- Formal Modelling and Analysis of Mission-Critical Software in Military Avionics Systems, in Volume 69;
- Towards Formal Specification and Analysis of Avionics Mission Systems, in Volume 12;
Top of ListR - Raak, Thomas - Database Collaboration Instead of Integration, in Volume 43;
- Raban, Richard - The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
- Rabhi, F. - Patterns for e-service composition, in Volume 13;
- Rabhi, Fethi A. - Bridging Semantic Gap, in Volume 13;
- Raddum, Havard - Algebraic Analysis of LEX, in Volume 98;
- Rademaker, Alexandre - Dealing with the Formal Analysis of Information Security Policies through Ontologies : A Case Study, in Volume 85;
- Radi, Odette - The Impact of Computer Use on Literacy in Reading Comprehension and Vocabulary Skills, in Volume 8;
- Radomirovic, Sasa - Towards a Decision Model Based on Trust and Security Risk Management, in Volume 98;
- Rae, Andrew - Guidance for Def (Aust) 5679 Issue 2, in Volume 100;
- Helping the Operator in the Loop: Practical Human Machine Interface Principles for Safe Computer Controlled Systems, in Volume 86;
- Raffensperger, John F. - Displaying Linear Programs and Their Solutions With XML and SVG, in Volume 35;
- Raghavan, Vijay V. - A Methodology for Hiding Knowledge in Databases, in Volume 14;
- Rahayu, J. Wenny - Aggregation Query Model for OODBMS, in Volume 10;
- ODMG Extension of Composite Objects in OODBMS: A Proposal, in Volume 10;
- Rahwan, Iyad - Intelligent Agents for Automated One-to-Many e-Commerce Negotiation, in Volume 4;
- Raikundalia, Gitesh - Newly-discovered Group Awareness Mechanisms for Supporting Real-time Collaborative Authoring, in Volume 40;
- Raikundalia, Gitesh K. - Extended Radar View and Modification Director: Awareness Mechanisms for Synchronous Collaborative Authoring, in Volume 50;
- Hospital Management Knowledge Discovery using Discrete Event Simulation, in Volume 68;
- Middle-Aged Users' Experience of Short Message Service, in Volume 50;
- SWIM: An Alternative Interface for MSN Messenger, in Volume 64;
- Rajala, Teemu - VILLE - a language-independent program visualization tool, in Volume 88;
- Rakotomalala, Ricco - Accuracy Estimation With Clustered Dataset, in Volume 61;
- Rakotonirainy, Andry - A Survey of Research on Context-Aware Homes, in Volume 21;
- Ramakrishna, M.V. - A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases, in Volume 5;
- Ramakrishnan, Raghu - Web Data Management, in Volume 75;
- Ramamohanarao, Kotagiri - A Bayesian Approach to Use Emerging Patterns for Classification, in Volume 17;
- Ramamritham, Krithi - Taming the Dynamics of Distributed Data, in Volume 63;
- Ramsay, Neil - Annotating UI Architecture with Actual Use, in Volume 76;
- Rana, Omer F. - Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids, in Volume 4;
- Randell, Cliff - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
- Randhawa, Sharmil - Improved Video Mosaic Construction by Selecting a Suitable Subset of Video Images, in Volume 26;
- Randolph, Nick - A Generalised Spreadsheet Verification Methodology, in Volume 4;
- Ranjan, Desh - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
- Rankine, T. - Service Oriented Grid Architecture for Geosciences Community, in Volume 68;
- Rao, M.R.K. Krishna - Learnability of Term Rewrite Systems from Positive Examples, in Volume 51;
- Ratcliffe, David - Towards Scalable Ontology Engineering Patterns: Lessons Learned from an Experiment based on W3Cs Part-whole Guidelines, in Volume 72;
- Rauch, Felix - OS Support for a Commodity Database on PC clusters - Distributed Devices vs. Distributed File Systems, in Volume 39;
- Ravada, Siva - Oracle's Technology for Bioinformatics and Future Directions, in Volume 19;
- Ravana, Sri Devi - Score Aggregation Techniques in Retrieval Experimentation, in Volume 92;
- Ravikumar, B. - Approximate Recognition of Non-regular Languages by Finite Automata, in Volume 38;
- Ray, Pradeep K. - Bridging Semantic Gap, in Volume 13;
- Raymond, Emma - Visualising the Probability Distribution Function of Uncertain Data - Application to Stochastic Modelling of Ground Water Solute Transport, in Volume 9;
- Reading, Jill - Teaching for Tomorrow - Integrating Learning Technologies into Early Years Professional Development , in Volume 34;
- Reddacliff, Cathy - Young Children Talking about Their Use of the Internet at Home and at School , in Volume 34;
- Redding, Nicholas J. - Fast Segmentation of Large Images, in Volume 16;
- Redmill, Felix - A Community Club on Safety-Critical Systems, in Volume 15;
- Thoughts on Safety Responsibilities of Management, in Volume 86;
- Rees, Michael J. - Evolving the Browser Towards a Standard User Interface Architecture, in Volume 7;
- Reeve, Greg - Logic and Refinement for Charts, in Volume 48;
- Reeves, Steve - Logic and Refinement for Charts, in Volume 48;
- Regan, Lyn - Integration of ICT into the Curriculum at Anderson's Creek Primary School, in Volume 23;
- Regan, Matthew - Human Visual Perception of Region Warping Distortions, in Volume 48;
- Large Object Segmentation with Region Priority Rendering, in Volume 38;
- Reid, Jason - Commitment Issues in Delegation Process, in Volume 81;
- Reid, Jason F. - DRM, Trusted Computing and Operating System Architecture, in Volume 44;
- Reid, Wayne - Reasoning about Data Parallelism in Modern Object-Oriented Languages, in Volume 74;
- Reilly, Rachel E. - An Empirical Evaluation of Chernoff Faces, Star Glyphs, and Spatial Visualisations for Binary Data, in Volume 24;
- Reina, G. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
- Reinhardt, Derek - Certification Criteria for Emulation Technology in the Australian Defence Force Military Avionics Context, in Volume 69;
- Reinhardt, Derek W. - Considerations in the Preference for and Application of RTCA/DO-178B in the Australian Military Avionics Context, in Volume 100;
- Reinhardt, L. - Some Structural and Geometric Properties of Two-Connected Steiner Networks, in Volume 65;
- Reitmayr, Gerhard - Location based Applications for Mobile Augmented Reality, in Volume 18;
- Ren, Qiong - Mitigating Phishing with ID-based Online/Offline Authentication, in Volume 81;
- Rennie, Lara - Aiding Text Entry of Foreign Alphabets with Visual Keyboard Plus, in Volume 40;
- Reuter, Jurgen - A Pluggable Architectural Model and a Formally Specified Programming Language Independent API for an Ontological Knowledge Base Server, in Volume 58;
- Reynolds, Mark - Measuring Data-Driven Ontology Changes using Text Mining, in Volume 70;
- Reynolds, Nicholas - Musical Composition and Creativity in an ICT-Enriched Learning Environment - a case study, in Volume 23;
- Reza Z'aba, Muhammad - Algebraic Analysis of LEX, in Volume 98;
- Rho, YongWoo - Integrated Visualization for Geometry PIG Data, in Volume 60;
- Rhodes, Anthony - Managing Large Class Assessment, in Volume 30;
- Rhodes, Anthony W. - Using Self-Defending Objects to Develop Security Aware Applications in Java, in Volume 26;
- Riaz-ud-Din, Faizal - Solving the Golden Transaction Problem for ARIES-based Multi-level Recovery, in Volume 92;
- Using Reflection for Querying XML Documents, in Volume 49;
- Riaz, Tariq - Multiple Sequence Alignment Using Tabu Search, in Volume 29;
- Riazati, Dariush - Drill Across and Visualization of Cubes with Non-conformed Dimensions, in Volume 75;
- Rice, Sally - Defining and Implementing Domains with Multiple Types using Mesodata Modelling Techniques, in Volume 53;
- Richards, Debbie - Graphically Defining Articulable Tacit Knowledge, in Volume 2;
- Intelligent Visualisation of Social Network Analysis Data, in Volume 2;
- Layered Earth Inversion Visual Toolkit: A Scientific Visualisation Case Study, in Volume 11;
- Selected Tacit Knowledge Observations Within Two Organisations, in Volume 22;
- Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20;
- The graphical interpretation of plausible tacit knowledge flows, in Volume 24;
- Visual Mapping of Articulable Tacit Knowledge, in Volume 9;
- Richardson, Colin - Node-level Architecture Design and Simulation of the MAGOG Grid Middleware, in Volume 99;
- Richardson, John - Internationalisation in the Large at Oracle, in Volume 32;
- Rigole, Peter - A Tool for Component Based Design of Embedded Software, in Volume 10;
- Riis, Karsten - A Powerful and SQL-Compatible Data Model and Query Language for OLAP, in Volume 5;
- Ritter, Nicola - Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear Slides, in Volume 62;
- Ritter, Norbert - Providing Semantically Equivalent, Complete Views for Multilingual Access to Integrated Data, in Volume 83;
- Rizzo, Alberto - Activity Centred Professional Development and Teachers' Take-Up of ICT, in Volume 23;
- Roantree, Mark - Metadata Management in Federated Multimedia Systems, in Volume 5;
- Robards, Matthew - A Discriminant Analysis for Undersampled Data, in Volume 84;
- Robbins, Anthony - Predictors of success in a first programming course, in Volume 52;
- The ability to articulate strategy as a predictor of programming skill, in Volume 52;
- Robbins, Phil - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
- Bloom's Taxonomy for CS assessment, in Volume 78;
- Roberts, Graham H.B. - An Online Programming Assessment Tool, in Volume 20;
- Roberts, Susan - A Jump-start in Learning? Young Children's Use of CDRom Technology, in Volume 34;
- Roberts, Tim - This Course Has A Bloom Rating Of 3.9, in Volume 30;
- Roberts, Tim S. - The Use of Multiple Choice Tests for Formative and Summative Assessment, in Volume 52;
- Robertson, Calum - News Aware Volatility Forecasting: Is the Content of News Important?, in Volume 70;
- What Types of Events Provide the Strongest Evidence that the Stock Market is Affected by Company Specific News?, in Volume 61;
- Robertson, Elaine - Integration of ICT into the Curriculum at Anderson's Creek Primary School, in Volume 23;
- Robey, Michael - Java Implementation Verification Using Reverse Engineering, in Volume 26;
- Using PSP to Evaluate Student Effort in Achieving Learning - Outcomes in a Software Engineering Assignment, in Volume 42;
- Robey, Mike - The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
- Robins, Anthony - My Program is Correct But it Doesn't Run: A Preliminary Investigation of Novice Programmers' Problems, in Volume 42;
- Observations of Student Competency in a CS1 Course, in Volume 42;
- Problem Distributions in a CS1 Course, in Volume 52;
- Robinson, Neil J. - Modelling Large Railway Interlockings and Model Checking Small Ones, in Volume 16;
- Robinson, P. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
- Robinson, Peter - Agent-Based Distributed Software Verification, in Volume 38;
- Robinson, Richard M. - SIL Rating Fire Protection Equipment, in Volume 33;
- Robinson, Ricky - SuperstringRep: Reputation-enhanced Service Discovery, in Volume 38;
- Robles-Kelly, Antonio - Image Feature Evaluation for Contents-based Image Retrieval, in Volume 56;
- Roddick, John F. - A Unifying Semantic Distance Model for Determining the Similarity of Attribute Values, in Volume 16;
- Application Rates to Undergraduate Programs in Information Technology in Australian Universities, in Volume 4;
- Context-Sensitive Mobile Database Summarisation, in Volume 16;
- CURIO: A Fast Outlier and Outlier Cluster Detection Algorithm for Large Datasets, in Volume 84;
- Defining and Implementing Domains with Multiple Types using Mesodata Modelling Techniques, in Volume 53;
- Detecting Anomalous Longitudinal Associations Through Higher Order Mining, in Volume 84;
- Detecting Privacy and Ethical Sensitivity in Data Mining Results, in Volume 26;
- Discovering Itemset Interactions, in Volume 91;
- Establishing a Lineage for Medical Knowledge Discovery, in Volume 70;
- Experiences in Building a Tool for Navigating Association Rule Result Sets, in Volume 32;
- Exploratory Mining over Organisational Communications Data, in Volume 87;
- Marking Time in Sequence Mining, in Volume 61;
- On the Impact of Knowledge Discovery and Data Mining, in Volume 1;
- SemGrAM - Integrating Semantic Graphs into Association Rule Mining, in Volume 70;
- Towards Active Conceptual Modelling for Sudden Events, in Volume 83;
- Rodrigo, Allen - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29;
- Evolution of Relative Synonymous Codon Usage in Human Immunodeficiency Virus Type 1, in Volume 29;
- Roe, Paul - A Programming Language for Web Service Development, in Volume 38;
- A Web Based Environment for Learning to Program, in Volume 16;
- Automated Feedback for 'Fill in the Gap' Programming Exercises, in Volume 42;
- Collaborative learning - towards a solution for novice programmers, in Volume 78;
- Improving the Flexibility of Active Grids through Web Services, in Volume 54;
- Program Annotations: Feedback for Students Learning to Program, in Volume 52;
- Static Analysis of Students' Java Programs, in Volume 30;
- The Carrick Vision and Computing Education: Four Case Studies in Multi-institutional Collaboration, in Volume 66;
- Towards a Fully-reflective Meta-programming Language, in Volume 38;
- Roehm, Uwe - Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks, in Volume 75;
- Rogers, Bill - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
- Rogers, Douglas W. - Multiple Platform Videoconferencing to Support Teacher Education and Professional Development in Mathematics, in Volume 23;
- Rogers, Yvonne - From Snark to Park: Lessons Learnt Moving Pervasive Experiences From Indoors to Outdoors, in Volume 28;
- Rolletschek, Hardy - Representing Experimental Biological Data in Metabolic Networks, in Volume 29;
- Romeike, Ralf - Applying creativity in CS high school education - criteria, teaching example and evaluation, in Volume 88;
- Rong-chun, Zhao - Face Recognition Using Multi-feature and Radial Basis Function Network, in Volume 22;
- Rongchun, Zhao - Optimal Selection of Image Segmentation Algorithms Based on Performance Prediction, in Volume 36;
- Rosamond, Frances - Parameterized Complexity of the Clique Partition Problem, in Volume 77;
- Rose, D. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
- Rosvik, Sindre - National Plans - Local Challenges: Preparing for Life Long Learning in a Digital Society , in Volume 34;
- Rotolo, Antonino - A Model of Dynamic Resource Allocation in Workflow Systems, in Volume 27;
- Process Modelling: The Deontic Way, in Volume 53;
- Rountree, Janet - Issues Regarding Threshold Concepts in Computer Science, in Volume 95;
- Observations of Student Competency in a CS1 Course, in Volume 42;
- Rountree, Nathan - Issues Regarding Threshold Concepts in Computer Science, in Volume 95;
- Observations of Student Competency in a CS1 Course, in Volume 42;
- Routledge, Nick - UML and XML Schema, in Volume 5;
- Rowe, Jillian - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42;
- Royle, Gordon - Edge-Selection Heuristics for Computing Tutte Polynomials, in Volume 94;
- Rozman, Ivan - Early Assessment of Classification Performance, in Volume 32;
- Ruan, Shanq-Jang - Sentry Tag: An Efficient Filter Scheme for Low Power Cache, in Volume 6;
- Rubin, Eran - A Framework Supporting the Utilization of Domain Knowledge Embedded in Software, in Volume 83;
- Rui, Kexing - Refactoring Use Case Models : The Metamodel, in Volume 16;
- Ruiz, Natalie - Exploratory Study of Lexical Patterns in Multimodal Cues, in Volume 57;
- Ruskey, Frank - Generating Balanced Parentheses and Binary Trees by Prefix Shifts, in Volume 77;
- Russel, A.B.M. - Towards Dynamic Data Grid Framework for eResearch, in Volume 54;
- Russell, Nick - On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling, in Volume 53;
- Russell, S. - Security as a Safety Issue in Rail Communications, in Volume 33;
- Russell, Selwyn - Visually Sealed and Digitally Signed Documents, in Volume 26;
- Rusu, Adrian - An Experimental Study on Algorithms for Drawing Binary Trees, in Volume 60;
- Rutherford, Paul - An Interactive Visualisation for Investigating DNA Sequence Information, in Volume 35;
- An Interactive Visualisation for Selecting PCR Primers, in Volume 45;
- Ryan, Amanda - Towards Semantic Interoperability in Healthcare: Ontology Mapping from SNOMED-CT to HL7 version 3, in Volume 72;
- Ryan, Caspar - Conflict Management For Real-Time Collaborative Editing in Mobile Replicated Architectures, in Volume 62;
- Improving the Transparency of Proxy Injection in Java, in Volume 91;
- The Effect of Context and Application Type on Mobile Usability: An Empirical Study, in Volume 38;
- Ryan, Mike - Unsupervised band removal leading to improved classification accuracy of hyperspectral images, in Volume 48;
- Ryu, Seung Hwan - A Framework for Managing the Evolution of Business Protocols in Web Services, in Volume 67;
Top of ListS - Saabas, Ando - Compositional Type Systems for Stack-Based Low-Level Languages, in Volume 51;
- Sadiq, Shazia - A Model of Dynamic Resource Allocation in Workflow Systems, in Volume 27;
- Data Flow and Validation in Workflow Modelling, in Volume 27;
- On Building Workflow Models for Flexible Processes, in Volume 5;
- Process Modelling: The Deontic Way, in Volume 53;
- Using a Temporal Constraint Network for Business Process Execution, in Volume 49;
- Sadiq, Wasim - Data Flow and Validation in Workflow Modelling, in Volume 27;
- Sadornil, D. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
- Saeed, Nauman - Incorporating blogs, social bookmarks, and podcasts into unit teaching, in Volume 78;
- Saeki, Motoshi - Extracting Conceptual Graphs from Japanese Documents for Software Requirements Modeling, in Volume 96;
- Using Attributed Goal Graphs for Software Component Selection: An Application of Goal-Oriented Analysis to Decision Making, in Volume 83;
- Safavi-Naini, Rei - Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks, in Volume 68;
- Safavi-Naini, Reihaneh - Digital Rights Management for Content Distribution, in Volume 21;
- Saffrey, Peter - The 'Mental Map' versus 'Static Aesthetic' Compromise in Dynamic Graphs : A User Study, in Volume 76;
- Saguez, Christian - Evaluation of Unique Sequences on the European Data Grid, in Volume 19;
- Sahama, Tony - Developing and Delivering a Software Internationalisation Subject, in Volume 32;
- Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC), in Volume 98;
- Privacy and Security in Open and Trusted Health Information Systems, in Volume 97;
- Security Enhanced Linux to Enforce Mandatory Access Control in Health Information Systems, in Volume 80;
- Sahama, Tony R. - A Data Warehouse Architecture for Clinical Data Warehousing, in Volume 68;
- Said, Dina - A Study of Local and Global Thresholding Techniques in Text Categorization, in Volume 61;
- Saint-Paul, Regis - A Framework for Managing the Evolution of Business Protocols in Web Services, in Volume 67;
- Saito, Toshinori - Roles of the Teacher in Media Literacy Education, in Volume 23;
- Sajeev, A. S. M. - Roller Interface for Mobile Device Applications, in Volume 64;
- Sajeev, A.S.M - Pattern Puzzle: A Metaphor for Visualizing Software Complexity Measures, in Volume 60;
- Sakai, Shinobu - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
- Salakoski, Tapio - Improving mathematics and programming education - the IMPEd initiative, in Volume 88;
- VILLE - a language-independent program visualization tool, in Volume 88;
- Why Complicate Things? Introducing Programming in High School Using Python, in Volume 52;
- Salo, Anniina - Effectiveness of integrating program visualizations to a programming course, in Volume 88;
- Salvador, Jordi - Image-Based Multi-view Scene Analysis using 'Conexels', in Volume 56;
- Salzer, Gernot - The Tau Model, Formalizing Topic Maps, in Volume 43;
- Samer, Marko - Tractable Cases of the Extended Global Cardinality Constraint, in Volume 77;
- Sanders, J. W. - Reasoning about a Distributed Probabilistic System, in Volume 94;
- Sanderud, Gunnar - Security in Mobile Communications: Challenges and Opportunities, in Volume 21;
- Sandom, Carl - Success and Failure: Human as Hero - Human as Hazard, in Volume 86;
- Sandy, Geoffrey A. - The Online Services Bill: Theories and Evidence of Pornographic Harm, in Volume 1;
- Saneifar, Hassan - S2MP: Similarity Measure for Sequential Patterns, in Volume 87;
- Sang, Yingpeng - Privacy Preserving Set Intersection Protocol Based on Bilinear Group, in Volume 74;
- Santiago, Confesor - An Experimental Study on Algorithms for Drawing Binary Trees, in Volume 60;
- Saragih, Jason - Learning Active Appearance Models from Image Sequences, in Volume 56;
- Sarai, Akinori - Structure-Function Relationship in DNA Sequence Recognition by Transcription Factors, in Volume 29;
- Sarje, Anil K. - OCP - A Distributed Real Time Commit Protocol, in Volume 49;
- Sarkar, Pradip K. - A Set of Patterns for the Web-based Interfaces of an Employee Services System, in Volume 13;
- Sasaki, M. - Transmembrane Region Prediction with Hydropathy Index/Charge Two-Dimensional Trajectories of Stochastic Dynamical Systems, in Volume 29;
- Sattar, Abdul - Code Improvements for Model Elimination Based Reasoning Systems, in Volume 26;
- Handling of Current Time in Native XML Databases, in Volume 49;
- Improving Search in a Hypothetical Reasoning System, in Volume 16;
- Saunders, Gary - Applying Anatomical Therapeutic Chemical (ATC) and Critical Term Ontologies to Australian Drug Safety Data for Association Rules and Adverse Event Signalling, in Volume 58;
- Saunders, Shane - Efficient Algorithms for Solving Shortest Paths on Nearly Acyclic Directed Graphs, in Volume 41;
- Savage, Joshua - Rapid Visual Flow: How Fast Is Too Fast?, in Volume 28;
- Savarimuthu, Bastin Tony Roy - Monitoring and Controlling of a Multi-agent Based Workflow System, in Volume 32;
- Towards a multi-lingual workflow system - a practical outlook, in Volume 32;
- Savonnet, Marinette - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
- Sbarski, Peter - Compact Layout of Layered Trees, in Volume 62;
- Scanlan, Joel - Catching Spam Before it Arrives: Domain Specific Dynamic Blacklists, in Volume 54;
- Schachte, Peter - Boolean Affine Approximation with Binary Decision Diagrams, in Volume 94;
- Boolean equation solving as graph traversal, in Volume 51;
- ParaAJ: toward Reusable and Maintainable Aspect Oriented Programs, in Volume 91;
- QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks, in Volume 62;
- Schadow, Gunther - Privacy-Preserving Distributed Queries for a Clinical Case Research Network, in Volume 14;
- Schaeffer, Jaron - A Pluggable Architectural Model and a Formally Specified Programming Language Independent API for an Ontological Knowledge Base Server, in Volume 58;
- Schafer, Andreas - Conceptional Modeling and Analysis of Spatio-Temporal Processes in Biomolecular Systems, in Volume 96;
- Schauder, Don - The Webworkforce - a learning repository to support educators, trainers and Information Technology courses, in Volume 20;
- Schewe, Klaus-Dieter - A Heuristic Approach to Cost-Efficient Derived Horizontal Fragmentation of Complex Value Databases, in Volume 63;
- A Heuristic Approach to Cost-Efficient Fragmentation and Allocation of Complex Value Databases, in Volume 49;
- A Typed Higher-Order Calculus for Querying XML Databases, in Volume 75;
- Balancing Redundancy and Query Costs in Distributed Data Warehouses, in Volume 43;
- Component-Driven Engineering of Database Applications, in Volume 53;
- Conceptual Application Domain Modelling, in Volume 96;
- Context Analysis: Toward Pragmatics of Web Information Systems Design, in Volume 79;
- Context-Aware Web Information Systems, in Volume 31;
- Dynamic Data Warehouse Design as a Refinement in ASM-based Approach, in Volume 67;
- Redundancy, Dependencies and Normal Forms for XML Databases, in Volume 39;
- Solving the Golden Transaction Problem for ARIES-based Multi-level Recovery, in Volume 92;
- Using Abstract State Machines for Distributed Data Warehouse Design, in Volume 31;
- Using Reflection for Querying XML Documents, in Volume 49;
- Schibeci, David - Grendel: A Bioinformatics Web Service-based Architecture for Accessing HPC Resources, in Volume 44;
- Schiller, Oliver - flashWeb: Graphical Modeling of Web Applications for Data Management, in Volume 83;
- Schlieder, Torsten - Approximative Filtering of XML Documents in Publish/Subscribe Systems, in Volume 48;
- Schmalstieg, Dieter - Interactive Mediated Reality, in Volume 40;
- Location based Applications for Mobile Augmented Reality, in Volume 18;
- Schmandt, Chris - AreWeThereYet? - A Temporally Aware Media Player, in Volume 76;
- Schmerl, Bradley - Architecture-driven Modelling and Analysis, in Volume 69;
- Schmid, Michael F. - Detecting Local Symmetry Axis in 3-dimensional Virus Structures, in Volume 29;
- Schmidt, Heinz - Compositional Software Architecture Definition, in Volume 12;
- Signature Extraction for Overlap Detection in Documents, in Volume 4;
- Suffix Vector: Space- and Time-Efficient Alternative to Suffix Trees, in Volume 4;
- Schmieder, Paul - Sketching ER Diagrams, in Volume 93;
- Scholer, Falk - A Comparative Study of Probabalistic and Language Models for Information Retrieval, in Volume 75;
- Scholz, Jason - Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom, in Volume 21;
- Schommer, Christoph - Description of Bad-Signatures for Network Intrusion Detection, in Volume 54;
- Schope, Lothar - Development of an Electronic Commerce Portal System using a Specific Software Development Process, in Volume 10;
- Schrefl, Michael - Exploiting Semantics of Inter-Process Dependencies to Instantiate Predefined Integration Patterns, in Volume 83;
- Modelling Inter-Process Dependencies with High-Level Business Process Modelling Languages, in Volume 79;
- Multi-Level Domain Modeling with M-Objects and M-Relationships, in Volume 96;
- On the Road to Behavior-Based Integration, in Volume 31;
- Schreiber, Falk - Comparison of Metabolic Pathways using Constraint Graph Drawing, in Volume 19;
- Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs, in Volume 60;
- Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary Size, in Volume 26;
- Optimal Leaf Ordering for Two and a Half Dimensional Phylogenetic Tree Visualisation, in Volume 35;
- Representing Experimental Biological Data in Metabolic Networks, in Volume 29;
- Visual Analysis of Network Centralities, in Volume 60;
- Schreiber, Mark - Signals in mRNAs that Influence the Initiation of Translation, in Volume 19;
- Schroder-Preikschat, Wolfgang - AspectC++: An Aspect-Oriented Extension to the C++ Programming Language, in Volume 10;
- Schroder, Heiko - A Dihedral Angle Database of Short Sub-sequences for Protein Structure Prediction, in Volume 29;
- Schrot, Paul P. - Improving Environmental Decision-making: Bridging the Gap between Conceptual Modelling and Quantitative Analyses with Quasta, in Volume 83;
- Schulte, Carsten - Computer science in context - pathways to computer science, in Volume 88;
- What does 'objects-first' mean? An international study of teachers' perceptions of objects-first, in Volume 88;
- Schulthess, P. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
- Schulz, Hans-Jorg - A Framework for Visual Data Mining of Structures, in Volume 48;
- Schumann, Heidrun - A Framework for Visual Data Mining of Structures, in Volume 48;
- Enhancing the Visualization Process with Principal Component Analysis to Support the Exploration of Trends, in Volume 60;
- Schwartzman, Leslie - Student transformative learning in software engineering and design: discontinuity (pre)serves meaning, in Volume 88;
- Schwarz, Holger - flashWeb: Graphical Modeling of Web Applications for Data Management, in Volume 83;
- Schwarz, Kilian - Grid Computing in Europe: From Research to Deployment, in Volume 44;
- Schwitter, Rolf - Annotating Websites with Machine-processable Information in Controlled Natural Language, in Volume 72;
- Creating and Querying Linguistically Motivated Ontologies, in Volume 90;
- Natural Language Processing in the Undergraduate Curriculum, in Volume 20;
- Schwoebbermeyer, Henning - Coordinated Perspectives and Enhanced Force-Directed Layout for the Analysis of Network Motifs, in Volume 60;
- Scriven, Ian - Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids, in Volume 82;
- Searle, Glenn - Funktion Zusammen: Two Schools, One Class and German LOTE in Rural Queensland, in Volume 8;
- Seberry, Jennifer - A New Very Fast Stream Cipher : Tpy, in Volume 81;
- Sedukhin, Stanislav G. - Trident: A Scalable Architecture for Scalar, Vector and Matrix Operations, in Volume 6;
- Segal, Tariq - Let the Shoemaker Make the Shoes - An Abstraction Layer is Needed Between Bioinformatic Analysis, Tools, Data and Equipment : An Agenda for the Next Five Years, in Volume 19;
- Seki, Tomokazu - Protein Side-chain Packing Problem: A Maximum Edge-weight Clique Algorithmic Approach, in Volume 29;
- Selvaraj, Samuel - Structure-Function Relationship in DNA Sequence Recognition by Transcription Factors, in Volume 29;
- Serafini, Luciano - Towards Distributed Tableaux Reasoning Procedure for DDL with Increased Subsumption Propagation between Remote Ontologies, in Volume 90;
- Serradilla, Francisco - The Effect of Sparsity on Collaborative Filtering Metrics, in Volume 92;
- Seymon, S. - Dogs or Robots - Why do Children See Them as Robotic Pets Rather Than Canine Machines?, in Volume 28;
- Shah, Ashish - The Impact of DRMs on Personal Use Expectations and Fair Dealing Rights, in Volume 44;
- Shah, Nita H. - Optimal Joint Vendor-Buyer Inventory Strategy for Deteriorating Items with Salvage Value, in Volume 77;
- Shalom, S. A. Arul - Graphics Hardware based Efficient and Scalable Fuzzy C-Means Clustering, in Volume 87;
- Shan, Yin - Mining Medical Specialist Billing Patterns for Health Service Management, in Volume 87;
- Shankaranarayanan, Avinash - A Template Based Static Coalition Protocol - A3PviGrid, in Volume 54;
- Shanker, Udai - OCP - A Distributed Real Time Commit Protocol, in Volume 49;
- Shanks, Vaughan R. - Indexing for Fast Categorisation, in Volume 16;
- Shanneb, Abdelsalam - Flexible Exclusion Control for Composite Objects, in Volume 38;
- Shao, Xi - Image Mosaics Based on Homogenous Coordinates, in Volume 22;
- Sharkey, Emma - Adventure Cycles A Software Engineering Approach, in Volume 30;
- Shaw, D.T. - Modelling Layer 2 and Layer 3 Device Bandwidths using B-Node Theory, in Volume 48;
- Shaw, Katherine - Engendering an Empathy for Software Engineering, in Volume 42;
- Shea, Roy - TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
- Sheard, Judithe - Adopting XP Practices for Teaching Object Oriented Programming, in Volume 52;
- Sheard, Judy - Determination of Factors which Impact on IT Students' Propensity to Cheat, in Volume 20;
- From Informal to Formal: Creating the Australasian Computing Education Community, in Volume 30;
- ICT teaching and learning in a new educational paradigm: lecturers' perceptions versus students' experiences, in Volume 88;
- Multi-Institutional Teaching Communities in Computer Education, in Volume 52;
- Performance and progression of first year ICT students, in Volume 78;
- WAT - A Tool for Classifying Learning Activities from a Log File, in Volume 66;
- What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
- Shehadi, Ihsan A. - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
- Shekhovtsov, Vladimir A. - An e-Process Selection Model, in Volume 83;
- Shen, Heng Tao - Efficient Similarity Search by Summarization in Large Video Database, in Volume 63;
- Exploring Bit-Difference for Approximate KNN Search in High-dimensional Databases, in Volume 39;
- Large-scale Video Sequence Indexing: Impacts, Ideas and Trends, in Volume 92;
- Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
- Shen, Hengtao - Diagonal Ordering: A New Approach to High-Dimensional KNN Processing, in Volume 27;
- Shen, Hong - Privacy Preserving Set Intersection Protocol Based on Bilinear Group, in Volume 74;
- Shen, Jialie - Exploring Bit-Difference for Approximate KNN Search in High-dimensional Databases, in Volume 39;
- Shen, Xiaobin - MoneyTree: Ambient Information Visualization Of Financial Data, in Volume 36;
- Using MoneyColor to Represent Financial Data, in Volume 45;
- Shen, Zeqian - BiblioViz: A System for Visualizing Bibliography Information, in Volume 60;
- Shepherd, John - A Collaborative Approach for Caching Dynamic Data in Portal Applications, in Volume 27;
- Document Classification via Structure Synopses, in Volume 17;
- Information Retrieval in Structured Domains, in Volume 92;
- Sheppard, Nicholas Paul - Digital Rights Management for Content Distribution, in Volume 21;
- Shi, Mingren - A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73;
- Shi, Yu - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
- Shi, Z. - Rule Sets Based Bilevel Decision Model, in Volume 48;
- Shiba, Ayumi - A Wearable Fatigue Monitoring System - Application of Human-Computer Interaction Evaluation, in Volume 50;
- Shieh, Jong-Jiann - Exploiting Speculative Value Reuse Using Value Prediction, in Volume 6;
- Shillabeer, Anna - Determining Pattern Element Contribution in Medical Datasets, in Volume 68;
- Discovering Itemset Interactions, in Volume 91;
- Establishing a Lineage for Medical Knowledge Discovery, in Volume 70;
- Shimshock, Erik - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
- Shin, Dongjun - Optimizing Web Content Delivery Using Web Server Accelerator, in Volume 4;
- Shin, Hyunjung - wFDT - Weighted Fuzzy Decision Trees for Prognosis of Breast Cancer Survivability, in Volume 87;
- Shinnishi, Makoto - SnapShoot: Integrating Semantic Analysis and Visualization Techniques for Web-based Note Taking System, in Volume 60;
- Shinohara, Ayumi - Testing Square-Freeness of Strings Compressed by Balanced Straight Line Program, in Volume 94;
- Shioya, Isamu - Clustering Stream Data by Regression Analysis, in Volume 32;
- Shizuki, Buntarou - FindFlow: Visual Interface for Information Search based on Intermediate Results, in Volume 60;
- Information Gathering Support Interface by the Overview Presentation of Web Search Results, in Volume 60;
- Shokouhi, Milad - Distributed Text Retrieval From Overlapping Collections, in Volume 63;
- Shottner, M. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
- Shuhidan, Shuhaida - A Taxonomic Study of Novice Programming Summative Assessment, in Volume 95;
- Shui, William - Querying and Maintaining Ordered XML Data using Relational Databases, in Volume 39;
- Shui, William M. - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19;
- Dynamic Labeling Schemes for Ordered XML Based on Type Information, in Volume 49;
- Siegel, H. J. - Scheduling Parallel Applications on Utility Grids: Time and Cost Trade-off Management, in Volume 91;
- Sierra, Carles - From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
- Sifer, Mark - A Grammer View for Editing Structured Documents, in Volume 11;
- Querying Web Site Visitor Trend Data with Coordinated Nested Bar and Pie Charts, in Volume 11;
- Siltanen, Sanni - Augmented Interiors with Digital Camera Images, in Volume 50;
- Implementing a Natural User Interface for Camera Phones Using Visual Tags, in Volume 50;
- Sim, Nigel G. D. - YourSRB: A cross platform interface for SRB and Digital Libraries, in Volume 68;
- Simari, Guillermo Ricardo - An Argumentative Approach to Reasoning with Inconsistent Ontologies, in Volume 90;
- Simcock, Todd - Developing a Location Based Tourist Guide Application, in Volume 21;
- Simeon, Mondelle - Categorical Proportional Difference: A Feature Selection Method for Text Categorization, in Volume 87;
- Simmich, Terry - Grid services for e-archaeology, in Volume 82;
- Simmonds, Andy - Student Learning Experience with an Industry Certification Course at University, in Volume 20;
- Simoff, Simeon - Customer Analytics Projects: Addressing Existing Problems with a Process that Leads to Success, in Volume 70;
- From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic Institutions, in Volume 62;
- Simoff, Simeon J. - Comparison of Visualization Methods of Genome-wide SNP Profiles in Childhood Acute Lymphoblastic Leukaemia, in Volume 87;
- Elastic Metaphors: Expanding the Philosophy of Interface Design, in Volume 37;
- Enterprise Architecture Modelling using Elastic Metaphors, in Volume 31;
- Kernel-based Visualisation of Genes with the Gene Ontology, in Volume 87;
- Modelling Enterprise Architectures: An Approach Based on Linking Metaphors and Ontologies, in Volume 58;
- Network Data Mining: Methods and Techniques for Discovering Deep Linkage between Attributes, in Volume 53;
- Weighted Kernel Model For Text Categorization, in Volume 61;
- Simon - A Grid Resource Allocation Mechanism for Heterogeneous E-waste Computers, in Volume 99;
- An IT degree combining the expertise of University and TAFE, in Volume 20;
- Electronic Watermarks to Help Authenticate Soft-copy Exams, in Volume 42;
- Koli Calling comes of age: an analysis, in Volume 88;
- Mandatory fields - a case study in the divergence between education and practice, in Volume 66;
- Mental models, consistency and programming aptitude, in Volume 78;
- Predictors of success in a first programming course, in Volume 52;
- Surely We Must Learn to Read before We Learn to Write!, in Volume 95;
- Ten Years of the Australasian Computing Education Conference, in Volume 95;
- The ability to articulate strategy as a predictor of programming skill, in Volume 52;
- The Cryptic Crossword Puzzle as a Useful Analogue in Teaching Programming, in Volume 30;
- Simon, Beth - Quality of Student Contributed Questions Using PeerWise, in Volume 95;
- The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78;
- Simpson, Leonie - Algebraic Analysis of LEX, in Volume 98;
- Simpson, Matthew - Successful Studio-based Real-World Projects in IT Education, in Volume 20;
- Singh, Abhishek - Creating an Internet Inter-ORB Protocol Service Specification, in Volume 12;
- Singh, Pramod K. - Unsupervised Segmentation of Medical Images using DCT Coefficients, in Volume 36;
- Singh, Samar - Bandwidth Reservation Strategies for Mobility Support of Wireless Connections with QoS Guarantees, in Volume 4;
- Singh, Vijay Pal - Hand gestures for HCI using ICA of EMG, in Volume 56;
- Sinha, Ranjan - Efficient Trie-Based Sorting of Large Sets of Strings, in Volume 16;
- HAT-Trie: A Cache-Conscious Trie-Based Data Structure For Strings, in Volume 62;
- Pruning SIFT for Scalable Near-duplicate Image Matching, in Volume 63;
- Sirett, William G. - Countermeasures for Attacks on Satellite TV Cards using Open Receivers, in Volume 44;
- Sirkkala, Petri - Nalkki-project - tool for plagiarism detection using the web, in Volume 88;
- Sitzmann, Inga - Compacting Discriminator Information for Spatial Trees, in Volume 5;
- Skabar, Andrew - Neural Networks and Financial Trading and the Efficient Markets Hypothesis, in Volume 4;
- Skeers, Rebecca - Self and Peer Assessment in Software Engineering Projects, in Volume 42;
- Skillicorn, D.B. - Programming with Heterogeneous Structures: Manipulating XML data Using bondi, in Volume 48;
- Skopal, Tomas - Elliptic Indexing of Multidimensional Databases, in Volume 92;
- Sladek, Jarrah - Speech-to-Text Transcription in Support of Pervasive Computing, in Volume 25;
- Sladescu, Matthew - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
- Slaviero, Jackie - Communicate in an E-Learning Community , in Volume 34;
- Slay, Hannah - Evaluation of a Universal Interaction and Control Device for use within Multiple Heterogeneous Display Ubiquitous Environments, in Volume 50;
- Interaction Modes for Augmented Reality Visualization, in Volume 9;
- Keg Master : a Graph-Aware Visual Editor for 3D Graphs, in Volume 18;
- Tangible User Interaction Using Augmented Reality, in Volume 7;
- Slay, Jill - Adaptive Learning Environments for CS Education : From AMLE to Live Spaces, in Volume 20;
- Sloane, Anthony - Submit!: A Web-based System for Automatic Program Critiquing, in Volume 20;
- Sloane, Anthony M. - A Pattern Enforcing Compiler (PEC) for Java: Using the Compiler, in Volume 43;
- Smale, Paul - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
- Smart, Will - Applying Online Gradient-Descent Search to Genetic Programming for Object Recognition, in Volume 32;
- Smid, Michiel - Geometric spanners with few edges and degree five, in Volume 51;
- Smillie, Jonathan - Integrating The MACHO Data-set with the Virtual Observatory, in Volume 44;
- Smith-Miles, Kate - Adaptive Spike Detection for Resilient Data Stream Mining, in Volume 70;
- Smith, Glenn - On the efficacy of prerecorded lectures for teaching introductory programming, in Volume 78;
- Tight Spirals and Industry Clients: The Modern SE Education Experience, in Volume 42;
- Using Animations to Support the Teaching of General Computing Concepts, in Volume 30;
- Smith, Graeme - A Framework for Modelling and Analysing Mobile Systems, in Volume 26;
- Specifying Mode Requirements of Embedded Systems, in Volume 4;
- Smith, Jason - Experiences in Passively Detecting Session Hijacking Attacks in IEEE 802.11 Networks, in Volume 54;
- Modelling Denial of Service Attacks on JFK with Meadows's Cost-Based Framework, in Volume 54;
- Security as a Safety Issue in Rail Communications, in Volume 33;
- Smith, Jocelyn - A Collaborative Guidance Case Study, in Volume 76;
- Smith, Kerrie - EdNA Online for Early Childhood Educators , in Volume 34;
- Smith, Lesley - Software engineering class eating its own tail, in Volume 66;
- Smith, Mark T. - Lightweight User Interfaces for Watch Based Displays, in Volume 40;
- Smith, Matthew - Resource Evaluation and Node Monitoring in Service Oriented Ad-hoc Grids, in Volume 82;
- Smith, Ross - Hand Tracking For Low Powered Mobile AR User Interfaces, in Volume 40;
- Smith, Ross T. - Public and Private Workspaces on Tabletop Displays, in Volume 76;
- Smithies, Russell - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
- Smyth, Barry - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
- Smyth, W.F. - An Approach to Phrase Selection for Offline Data Compression, in Volume 4;
- Smyth, William F. - Suffix Arrays: What Are They Good For?, in Volume 49;
- Sodre, Victor de�Freitas - Improving Productivity and Quality of GIS Databases Design using an Analysis Pattern Catalog, in Volume 43;
- Soe, Nay Lin - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
- Soetanto, Danny - Analyzing Harmonic Monitoring Data Using Data Mining, in Volume 61;
- Soliman, Mostafa I. - Trident: A Scalable Architecture for Scalar, Vector and Matrix Operations, in Volume 6;
- Solis-Oba, Roberto - On Packing Squares with Resource Augmentation: Maximizing the Profit, in Volume 41;
- Solomon, Andrew - Applying NAILS to Blackboard, in Volume 20;
- Somaraju, Ram - Tamper-proofing Software Watermarks, in Volume 32;
- Somekh, Bridget - Children Exploring a 'Fun' Web-site: Sites of Learning and Roles of Being, in Volume 34;
- Sondergaard, Harald - Boolean Affine Approximation with Binary Decision Diagrams, in Volume 94;
- Boolean equation solving as graph traversal, in Volume 51;
- Making Connections: First Year Transition for Computer Science and Software Engineering Students, in Volume 42;
- What Drives Curriculum Change?, in Volume 30;
- Song, Changxin - A Combined Model and a Varied Gibbs Sampling Algorithm Used for Motif Discovery, in Volume 29;
- Song, Dawei - Dimensionality Reduction in Patch-Signature Based Protein Structure Matching, in Volume 49;
- Document Generality: its Computation for Ranking, in Volume 49;
- Song, Gao - Reducing Register Pressure Through LAER Algorithm, in Volume 26;
- Song, Il-Yeol - A Taxonomy of Customer Relationship Management Analyses for Data Warehousing, in Volume 83;
- Song, Jian - Architecture of a Web Accelerator For Wireless Networks, in Volume 62;
- Song, Le - Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters, in Volume 45;
- Real-time 3D Finger Pointing for an Augmented Desk, in Volume 40;
- Song, Qun - A Novel Feature Selection Method to Improve Classification of Gene Expression Data, in Volume 29;
- Sonntag, Benoit - Lisaac: the power of simplicity at work for operating system, in Volume 10;
- Soon, Lay-Ki - An Empirical Study of Similarity Search in Stock Data, in Volume 84;
- Sorger, Uli - Slotted Packet Counting Attacks on Anonymity Protocols, in Volume 98;
- Soriano, Christine - Middle-Aged Users' Experience of Short Message Service, in Volume 50;
- Sorva, Juha - Students' understandings of storing objects, in Volume 88;
- Spaccapietra, Stefano - Dynamic Modeling of Trajectory Patterns using Data Mining and Reverse Engineering, in Volume 83;
- Exploring New Directions in Conceptual Data Modeling, in Volume 67;
- Sparks, Ross - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
- Speer, Jayson - Solving the Golden Transaction Problem for ARIES-based Multi-level Recovery, in Volume 92;
- Spence, Edward - Cosmopolitanism and the Internet, in Volume 1;
- Spence, Fiona - Peer Assessment Using Aropa, in Volume 66;
- Spiewak, Dagmara - Acimn: A protocol for Anonymous Communication In Multi hop wireless networks, in Volume 81;
- Spinczyk, Olaf - AspectC++: An Aspect-Oriented Extension to the C++ Programming Language, in Volume 10;
- Squair, Matthew John - Human Engineering for Australia's F/A-18 Night Vision Capability, in Volume 86;
- Issues in the Application of Software Safety Standards, in Volume 55;
- Safety, Software Architecture and MIL-STD-1760, in Volume 69;
- Sridharan, Sridha - Audio-Visual Speaker Verification using Continuous Fused HMMs, in Volume 56;
- Patch-Based Representation of Visual Speech, in Volume 56;
- Srinivasan, B. - An Evaluation of Web Services in the Design of a B2B Application, in Volume 26;
- Srinivasan, Uma - Role of Edge Detection in Video Semantics, in Volume 22;
- Srivastava, P.K. - A Heuristic Algorithm for Combining Fuzzy Results in Multimedia Databases, in Volume 5;
- Staab, Eugen - Slotted Packet Counting Attacks on Anonymity Protocols, in Volume 98;
- Stafford, Aaron - Comparison of techniques for mixed-space collaborative navigation, in Volume 93;
- User Evaluation of God-like Interaction Techniques, in Volume 76;
- Stager, Gary S. - Computationally-Rich Constructionism and At-Risk Learners, in Volume 8;
- Online Constructionism and the Future of Teacher Education, in Volume 23;
- The Feeling of Wonderful Ideas - Implications for the Future of Teaching and Learning, in Volume 23;
- Stanley, Edward - S.E.A.L. - A Query Language for Entity-Association Queries, in Volume 92;
- Stanley, Timothy D. - Simple Eight Bit, Emulated Computers for Illustrating Computer Architecture Concepts and Providing a Starting Point for Student Designs, in Volume 66;
- Stantic, Bela - An Efficient Method for Indexing Now-relative Bitemporal data, in Volume 27;
- Handling of Current Time in Native XML Databases, in Volume 49;
- Unified Q-ary Tree for RFID Tag Anti-Collision Resolution, in Volume 92;
- Stark, Karen - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42;
- Using a Network Simulation Tool to Engage Students in Active Learning Enhances Their Understanding of Complex Data Communications Concepts., in Volume 42;
- Stead, Stephen - The CIDOC Conceptual Reference Model - A New Standard for Knowledge Sharing, in Volume 83;
- Steele, Robert - A Local Broker Enabled MobiPass Architecture for Enhancing Trusted Interaction Efficiency, in Volume 74;
- Stegmaier, S. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
- Sterling, Leon - A Perspective on the International Olympiad in Informatics for CS educators, in Volume 95;
- Stern, L. - A Rapid Method of Whole Genome Visualisation Illustrating Features in Both Coding and Non-coding Regions, in Volume 29;
- Stevenson, Duncan - A Collaborative Guidance Case Study, in Volume 76;
- Stewart, Arran D. - Building a Disordered Protein Database: A Case Study in Managing Biological Data, in Volume 63;
- Stewart, Bozena - Reflection on Development and Delivery of a Data Mining Unit, in Volume 70;
- Stewart, Graeme A. - Storage and Data Management in EGEE, in Volume 68;
- Stirling, David - Analyzing Harmonic Monitoring Data Using Data Mining, in Volume 61;
- Stocks, Phil - Self-Replicating Expressions in the Lambda Calculus, in Volume 26;
- Stoeckle, Hermann - Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
- Stokes, Jackie - Developing Generic Attributes in a Pre-service Primary Teacher Education Course, in Volume 8;
- Towards Knowledge Age Teachers: Reflective Practitioners, in Volume 8;
- Stone, Gordon - On Arguing the Safety of Large Systems, in Volume 55;
- Stone, Gordon R. - Complex Reactive Real Time Systems and the Safety Case, in Volume 47;
- Straeten, Ragnhild Van Der - Specifying and Implementing the Operational Use of Constraints in Object-Oriented Applications, in Volume 10;
- Stranieri, Andrew - A Classification Algorithm that Derives Weighted Sum Scores for Insight into Disease, in Volume 97;
- An Argument Structure Abstraction for Bayesian Belief Networks: Just Outcomes in On-line Dispute Resolution, in Volume 67;
- Classification for accuracy and insight: A weighted sum approach, in Volume 70;
- Inference of Gene Expression Networks Using Memetic Gene Expression Programming, in Volume 91;
- Strazdins, Peter - Applying the community of practice approach to individual IT projects, in Volume 78;
- Efficient Cycle-Accurate Simulation of the Ultrasparc III CPU, in Volume 62;
- Implemention Aspects of a SPARC V9 Complete Machine Simulator, in Volume 4;
- Stricker, Thomas M. - OS Support for a Commodity Database on PC clusters - Distributed Devices vs. Distributed File Systems, in Volume 39;
- Strimmer, Korbinian - A Brief Introduction to the Phylogenetic Analysis Library V1.5, in Volume 29;
- Strooper, P. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
- Strooper, Paul - Agent-Based Distributed Software Verification, in Volume 38;
- An Approach to Specifying Software Frameworks, in Volume 26;
- Evaluation of a New Assesment Scheme for a Third-year Concurrency Course, in Volume 66;
- Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models, in Volume 16;
- Plug-in Proof Support for Formal Development Environments, in Volume 41;
- Translating Refined Logic Programs to Mercury, in Volume 4;
- Stuckey, Peter - Modelling for Lazy Clause Generation, in Volume 77;
- The Core Concept for 0/1 Integer Programming, in Volume 77;
- Stuckey, Peter J. - Compacting Discriminator Information for Spatial Trees, in Volume 5;
- Improving SAT Using 2SAT, in Volume 4;
- Stucky, Wolffried - A Formal Foundation for Workflow Composition, Workflow View Definition, and Workflow Normalization based on Petri Nets, in Volume 43;
- Stumptner, Markus - A Native Ontology Approach for Semantic Service Descriptions, in Volume 72;
- Enhancing Subjective Ontologies with Social Tagging Systems, in Volume 90;
- Exploiting Semantics of Inter-Process Dependencies to Instantiate Predefined Integration Patterns, in Volume 83;
- Modelling Inter-Process Dependencies with High-Level Business Process Modelling Languages, in Volume 79;
- On the Road to Behavior-Based Integration, in Volume 31;
- Trust Based Ontology Integration For The Community Services Sector, in Volume 72;
- Stuphorn, Jorn - Two Causal Analyses of the Black Hawk Shootdown during Operation Provide Comfort, in Volume 33;
- Subramaniam, Ganesan - Mesh Simplification using Ellipsoidal Schema for Isotropic Quantization of Face-Normal Vectors, in Volume 60;
- Sucahyo, Yudho Giri - CT-ITL : Efficient Frequent Item Set Mining Using a Compressed Prefix Tree with Pattern Growth, in Volume 17;
- Sugiyama, Kozo - Generation of Relevance Maps and Navigation in A Digital Book, in Volume 60;
- Method for Drawing Intersecting Clustered Graphs and Its Application to Web Ontology Language, in Volume 60;
- Puzzle Generators and Symmetric Puzzle Layout, in Volume 45;
- Suhonen, Jarkko - Applications of variation theory in computing education, in Volume 88;
- Sui, Yuefei - An Unified Dynamic Description Logic Model for Databases: Relational Data, Relational Operations and Queries, in Volume 83;
- Sulistio, Anthony - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
- Sun, Hung-Min - On the Security of Some Proxy Blind Signatures Schemes, in Volume 32;
- Sun, Jing - Towards Verifying Semistructured Data, in Volume 67;
- Sun, Lili - Anonymous Access Scheme for Electronic Services, in Volume 26;
- Authorization Algorithms for the Mobility of User-Role Relationship, in Volume 38;
- Sun, Xiaoxun - An efficient hash-based algorithm for minimal k-anonymity, in Volume 74;
- Microdata Protection Through Approximate Microaggregation, in Volume 91;
- Priority Driven K-Anonymisation for Privacy Protection, in Volume 87;
- Sun, Xingzhi - Data Reduction Approach for Sensitive Association Classification Rule Hiding, in Volume 75;
- Sun, Yong - QuickFusion: Multimodal Fusion Without Time Thresholds, in Volume 57;
- Sun, Zhaohui - Local Prediction Approach of Protein Classification using Probabilistic Suffix Trees, in Volume 29;
- Sun, Zhirong - A Novel Method for Protein Subcellular Localization Based on Boosting and Probabilistic Neural Network, in Volume 29;
- Sung, Hosang - Deferred Incremental Refresh of XML Materialized Views : Algorithms and Performance Evaluation, in Volume 17;
- Surarerks, A. - Formalization of UML Statechart Models Using Concurrent Regular Expressions, in Volume 26;
- Suriadi, Suriadi - Layered Identity Infrastructure Model for Identity Meta Systems, in Volume 81;
- Usability and Privacy in Identity Management Architectures, in Volume 68;
- Susilo, Willy - Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks, in Volume 68;
- Mitigating Phishing with ID-based Online/Offline Authentication, in Volume 81;
- Sutinen, Alison - Mining Medical Specialist Billing Patterns for Health Service Management, in Volume 87;
- Sutinen, Erkki - Computer science students can help to solve problems of multiplayer mobile games, in Volume 88;
- Con�ictive animations as engaging learning tools, in Volume 88;
- Sutton, Ken - Surely We Must Learn to Read before We Learn to Write!, in Volume 95;
- The ability to articulate strategy as a predictor of programming skill, in Volume 52;
- Sutton, Peter - Ambient Interaction Framework - Software Infrastructure for the Rapid Development of Pervasive Computing Environments, in Volume 25;
- Location Management in Pervasive Systems, in Volume 21;
- Suzuki, Nobutaka - An XML Document Transformation Algorithm Inferred from an Edit Script between DTDs, in Volume 75;
- Swaminathan, Sudha - The Role of the Teacher in Scaffolding Children's Interactions in a Technological Environment: How a Technology Project is Transforming Preschool Teacher Practices in Urban Schools, in Volume 34;
- Symvonis, Antonios - Polygons Labelling of Minimum Leader Length, in Volume 60;
- Szajman, Jakub - Middle-Aged Users' Experience of Short Message Service, in Volume 50;
- Szeider, Stefan - The Parameterized Complexity of Regular Subgraph Problems and Generalizations, in Volume 77;
- Tractable Cases of the Extended Global Cardinality Constraint, in Volume 77;
- Szeto, Lap Keung - Gene Expression Data Clustering and Visualization Based on a Binary Heirarchical Clustering Framework, in Volume 19;
- Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
Top of ListT - Tada, Masahiro - An Interface Test-Bed for 'Kansei' Filters Using the Touch Designer Visual Programming Environment, in Volume 50;
- Tahaghoghi, S. M. M. - Content-based Image Retrieval Using Image Regions as Query Examples, in Volume 75;
- Tahaghoghi, S.M.M. - Plagiarism Detection across Programming Languages, in Volume 48;
- Stemming Indonesian, in Volume 38;
- Video Cut Detection using Frame Windows, in Volume 38;
- Tahaghoghi, Seyed M. M. - Exploring Human Judgement of Digital Imagery, in Volume 62;
- Tai, Hsiu Ling - Ladderlike Stepping and Interval Jumping Searching Algorithms for DNA Sequences, in Volume 29;
- Taib, Ronnie - Multimodal User Interface Facilitating Critical Data Entry for Traffic Incident Management, in Volume 57;
- Takagi, Toshihisa - A Pathway Editor for Literature-based Knowledge Curation, in Volume 29;
- Takahashi, Naohisa - Redundant Parallel Data Transfer Schemes for the Grid Environment, in Volume 54;
- Takaoka, Tadao - Combinatorial Generation by Fusing Loopless Algorithms, in Volume 51;
- Efficient Algorithms for Solving Shortest Paths on Nearly Acyclic Directed Graphs, in Volume 41;
- Improved Shortest Path Algorithms For Nearly Acyclic Directed Graphs, in Volume 62;
- Takatsuka, Masahiro - Adding Filtering to Geometric Distortion to Visualize a Clustered Graph on Small Screens, in Volume 35;
- Graph Interaction through Force-Based Skeletal Animation, in Volume 35;
- Real-time 3D Finger Pointing for an Augmented Desk, in Volume 40;
- Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer Interaction, in Volume 38;
- The Geodesic Self-Organizing Map and Its Error Analysis, in Volume 38;
- Three Dimensional Colour Pickers, in Volume 45;
- Visualization of a Closed Three-Dimensional Surface using Portal-based Rendering, in Volume 60;
- Visualizing Multivariate Network on the Surface of a Sphere, in Volume 60;
- Takatsuko, Masahiro - Inclusion Tree Layout Convention : An Empirical Investigation, in Volume 24;
- Takimoto, Eiji - Lower Bounds on Quantum Query Complexity for Read-Once Decision Trees with Parity Nodes, in Volume 94;
- Talbot, Hugues - Unseeded Region Growing for 3D Image Segmentation, in Volume 2;
- Talley, Sue - Bridging the Gap Between Theory and Practice in Preservice Education : The Use of Video Case Studies, in Volume 23;
- Tam, Vincent W. L. - Information Retrieval in Structured Domains, in Volume 92;
- Tan, Aik Choon - An Empirical Comparison of Supervised Machine Learning Techniques in Bioinformatics, in Volume 19;
- Tan, Jefferson - Optimizing Tunneled Grid Connectivity across Firewalls, in Volume 99;
- Tan, Kian-Lee - B-trees: Bearing Fruits of All Kinds, in Volume 5;
- BLAST++ : A Tool for BLASTing Queries in Batches, in Volume 19;
- Exploring Bit-Difference for Approximate KNN Search in High-dimensional Databases, in Volume 39;
- Tan, Lei - Interoperability for Geospatial Analysis: a Semantics and Ontology-based Approach, in Volume 63;
- Tan, Patrick - Support Vector Machine Approach for Cancer Detection Using Amplified Fragment Length Polymorphism (AFLP) Screening Method, in Volume 29;
- Tanaka, Jiro - FindFlow: Visual Interface for Information Search based on Intermediate Results, in Volume 60;
- Information Gathering Support Interface by the Overview Presentation of Web Search Results, in Volume 60;
- NeL2: Network Drawing Tool for Handling Layered Structured Network Diagram, in Volume 60;
- Ripple Presentation for Tree Structures with Historical Information, in Volume 60;
- Tanbeer, Syed Khairuzzaman - ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns, in Volume 87;
- Tandianus, Jeff E. - Video Cataloguing and Browsing, in Volume 11;
- Tang, Anthony - Display and Presence Disparity in Mixed Presence Groupware, in Volume 28;
- Tang, Jia - An Agent-based Peer-to-Peer Grid Computing Architecture - Convergence of Grid and Peer-to-Peer Computing, in Volume 54;
- Tang, Jianmin - An open problem: (4; g)-cages with odd g <= 5 are tightly connected, in Volume 65;
- Tang, Qing - Compressed Video Transmission over Digital Networks : Analysis and Design, in Volume 22;
- Tang, Sy-sen - Gene Expression Data Clustering and Visualization Based on a Binary Heirarchical Clustering Framework, in Volume 19;
- Taniar, David - Aggregation Query Model for OODBMS, in Volume 10;
- ODMG Extension of Composite Objects in OODBMS: A Proposal, in Volume 10;
- Tao, Trevor - A Useful Bound for Region Merging Algorithms in a Bayesian Model, in Volume 16;
- Tao, Will - A Local Broker Enabled MobiPass Architecture for Enhancing Trusted Interaction Efficiency, in Volume 74;
- Tari, Zahir - A CORBA Cooperative Cache Approach with Popularity Admission and Routing Mechanism, in Volume 5;
- The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed Workloads, in Volume 91;
- Tatsuta, Makoto - Type Checking and Inference for Polymorphic and Existential Types, in Volume 94;
- Taylor, Hamish - Condensative Stream Query Language for Data Streams, in Volume 63;
- Taylor, John L. - Steve Austin Versus the Symbol Grounding Problem, in Volume 37;
- Taylor, Ken - Applying Enterprise Architectures and Technology to the Embedded Devices Domain, in Volume 21;
- Taylor, Kerry - Implementing Role Based Access Control for Federated Information Systems on the Web, in Volume 21;
- Large scale colour ontology generation with XO, in Volume 58;
- The Semantics of Water, in Volume 72;
- Towards Scalable Ontology Engineering Patterns: Lessons Learned from an Experiment based on W3Cs Part-whole Guidelines, in Volume 72;
- What is Required in Business Collaboration?, in Volume 92;
- Taylor, Paul R. - Patterns of the Prairie Houses, in Volume 13;
- Taylor, Richard - Effective Prediction and its Computational Complexity, in Volume 65;
- te Braak, Paul - Temporal Pattern Matching for the Prediction of Stock Prices, in Volume 84;
- Teague, Donna - A People-First Approach to Programming, in Volume 95;
- Collaborative learning - towards a solution for novice programmers, in Volume 78;
- Losing Their Marbles: Syntax-Free Programming for Assessing Problem-Solving Skills, in Volume 95;
- Teague, Vanessa - On The Complexity of Manipulating Elections, in Volume 65;
- QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay Networks, in Volume 62;
- Teasdale, R. D. - Automated Sub-Cellular Phenotype Classification: An Introduction and Recent Results, in Volume 73;
- Teisseire, Maguelonne - S2MP: Similarity Measure for Sequential Patterns, in Volume 87;
- Teltzrow, Maximilian - Privacy Conflicts in CRM Services for Online Shops: A Case Study, in Volume 14;
- Tempero, Ewan - A Comparison and Evaluation of Interpolation Methods for Visualising Discrete 2D Survey Data, in Volume 35;
- A Framework for InteractiveWeb-Based Visualization, in Volume 50;
- Delegation Diagrams: Visual Support for the Development of Object-Oriented Designs, in Volume 28;
- Dynamic Measurement of Polymorphism, in Volume 62;
- Essential Use Cases and Responsibility in Object-Oriented Development, in Volume 4;
- Evaluating Scalable Vector Graphics for Use in Software Visualisation, in Volume 24;
- Experiences in Teaching Quality Attribute Scenarios, in Volume 95;
- Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
- How (Not) To Help People Test Drive Code, in Volume 7;
- Identifying Refactoring Opportunites by Identifying Dependency Cycles, in Volume 48;
- Jooj: Real-Time Support For Avoiding Cyclic Dependencies, in Volume 62;
- JWS: A Flexible Web Service, in Volume 74;
- Metaphor and Metonymy in Object-Oriented Design Patterns, in Volume 4;
- On Measuring Java Software, in Volume 74;
- Patterns for Essential Use Case Bodies, in Volume 13;
- Reflections on CRC Cards and OO Design, in Volume 10;
- Sokoban: A System Object Case Study, in Volume 10;
- Supporting Software Reuse by the Individual Programmer, in Volume 48;
- Teaching the Evaluation of Object-Oriented Designs, in Volume 20;
- The CRSS Metric for Package Design Quality, in Volume 62;
- Visualising Reusable Software Over The Web, in Volume 9;
- Temple, Mark - Learning Causal Networks from Microarray Data, in Volume 73;
- Learning from Ontological Annotation : an Application of Formal Concept Analysis to Feature Construction in the Gene Ontology, in Volume 85;
- Tena, J. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
- Tenenberg, Josh - Multi-Institutional Teaching Communities in Computer Education, in Volume 52;
- Teo, Yong M. - An Approach to Vickrey-based Resource Allocation in the Presence of Monopolistic Sellers, in Volume 99;
- Teo, Yong Meng - DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids, in Volume 68;
- Teoh, Soon Tee - BiblioViz: A System for Visualizing Bibliography Information, in Volume 60;
- ter Hofstede, A. H. M. - Product Flow Analysis in Distribution Networks with a Fixed Time Horizon, in Volume 74;
- ter Hofstede, Arthur H.M. - On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling, in Volume 53;
- Terada, Routo - A New Version of the RC6 Algorithm, Stronger against \chi^2 Cryptanalysis, in Volume 98;
- Teredesai, Ankur - Modeling Proliferation of Ideas in Online Social Networks, in Volume 61;
- Terracina, Giorgio - A Framework for Improving Protein Structure Predictions by Teamwork, in Volume 19;
- Terrasse, Marie-Noelle - Metamodeling Integration Architecture for Open Biomedical Ontologies: The GO Extensions' Case Study, in Volume 83;
- Thaicharoen, Supphachai - Structure-Based Document Model with Discrete Wavelet Transforms and Its Application to Document Classification, in Volume 87;
- Thalheim, Bernhard - Co-Design of Structuring, Functionality, Distribution, and Interactivity for Information Systems, in Volume 31;
- Component-Driven Engineering of Database Applications, in Volume 53;
- Conceptual Application Domain Modelling, in Volume 96;
- Context Analysis: Toward Pragmatics of Web Information Systems Design, in Volume 79;
- Context-Aware Web Information Systems, in Volume 31;
- Database Collaboration Instead of Integration, in Volume 43;
- Database Component Ware, in Volume 17;
- Operational Semantics of Transactions, in Volume 17;
- Tham, Lawrence - Support Vector Machine Approach for Cancer Detection Using Amplified Fragment Length Polymorphism (AFLP) Screening Method, in Volume 29;
- Thangarajah, John - Representation and Reasoning for Goals in BDI Agents, in Volume 4;
- Thevathayan, Charles - Transforming learning of programming: a mentoring project, in Volume 78;
- Thiagarajan, Rajesh - A Native Ontology Approach for Semantic Service Descriptions, in Volume 72;
- Thies, Gunnar - Modelling Web-Oriented Architectures, in Volume 96;
- Thoai, N. - An Approach to Vickrey-based Resource Allocation in the Presence of Monopolistic Sellers, in Volume 99;
- Thom, James A. - Content-based Image Retrieval Using Image Regions as Query Examples, in Volume 75;
- Drill Across and Visualization of Cubes with Non-conformed Dimensions, in Volume 75;
- Exploring Human Judgement of Digital Imagery, in Volume 62;
- Video Cut Detection using Frame Windows, in Volume 38;
- Thomas, Bruce - Target Motion Analysis Visualisation, in Volume 45;
- Thomas, Bruce H. - Augmenting Image Place AR 3D Interactions for Wearable Computers, in Volume 93;
- Comparison of techniques for mixed-space collaborative navigation, in Volume 93;
- Developing a Location Based Tourist Guide Application, in Volume 21;
- Enabling Co-located Ad-hoc Collaboration on Shared Displays, in Volume 76;
- Evaluation of a Universal Interaction and Control Device for use within Multiple Heterogeneous Display Ubiquitous Environments, in Volume 50;
- Evaluation of User Satisfaction and Learnability for Outdoor Augmented Reality Gaming, in Volume 50;
- Groupware Support in the Windowing System, in Volume 64;
- Interaction Modes for Augmented Reality Visualization, in Volume 9;
- Keg Master : a Graph-Aware Visual Editor for 3D Graphs, in Volume 18;
- Lightweight User Interfaces for Watch Based Displays, in Volume 40;
- Modeling Reach For Use in User Interface Design, in Volume 64;
- Outdoor Augmented Reality Gaming on Five Dollars a Day, in Volume 40;
- Tangible User Interaction Using Augmented Reality, in Volume 7;
- The Tinmith System - Demonstrating New Techniques for Mobile Augmented Reality Modelling, in Volume 7;
- TIDL: Mixed Presence Groupware Support for Legacy and Custom Applications, in Volume 50;
- Thomas, Martyn - Engineering Judgement, in Volume 47;
- Thomas, Pete - Measuring Improvement in Latent Semantic Analysis-Based Marking Systems: Using a Computer to Mark Questions about HTML, in Volume 66;
- Thomas, Richard C. - An Investigation into Keystroke Latency Metrics as an Indicator of Programming Performance, in Volume 42;
- Developing Case Studies to Enhance Student Learning, in Volume 42;
- Developing the Software Engineering Team, in Volume 42;
- Difficulties experienced by students in maintaining object-oriented systems: an empirical study, in Volume 66;
- Tight Spirals and Industry Clients: The Modern SE Education Experience, in Volume 42;
- Thomas, Theda - Cooperative Learning and Object-Orientated Development Methods, in Volume 23;
- Thomborson, Clark - A Framework for Obfuscated Interpretation, in Volume 32;
- A Functional Taxonomy for Software Watermarking, in Volume 4;
- Foundation for Systems Security, in Volume 98;
- Manufacturing Opaque Predicates in Distributed Systems for Code Obfuscation, in Volume 48;
- Passwords and Perceptions, in Volume 98;
- Preliminary Security Specification for New Zealand's igovt System, in Volume 98;
- Tamper-proofing Software Watermarks, in Volume 32;
- Thompson, Errol - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
- Applications of variation theory in computing education, in Volume 88;
- Bloom's Taxonomy for CS assessment, in Volume 78;
- Exploring Conceptions of programming, in Volume 52;
- Holistic assessment criteria - Applying SOLO to programming projects, in Volume 66;
- The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78;
- Using a subject area model as a learning improvement model, in Volume 52;
- Thomson, Kirsten - Use of Video Shadow for Small Group Interaction Awareness on a Large Interactive Display Surface, in Volume 18;
- Thongkam, Jaree - Breast Cancer Survivability via AdaBoost Algorithms, in Volume 80;
- Thornton, John - An Efficient Method for Indexing Now-relative Bitemporal data, in Volume 27;
- Thredgold, J. - Modelling Smart Security for Classified Rooms with DOVE, in Volume 12;
- Thurbon, Joe - Experimental Evaluation of a Program Visualisation Tool for Use in Computer Science Education, in Volume 24;
- Ti, Yen-Wu - Testing Embeddability Between Metric Spaces, in Volume 77;
- Tian, Lin - Improved Shortest Path Algorithms For Nearly Acyclic Directed Graphs, in Volume 62;
- Tian, Ye Henry - Mechanically Verifying Correctness of CPS Compilation, in Volume 51;
- Tibbey, Grant - WAT - A Tool for Classifying Learning Activities from a Log File, in Volume 66;
- Tickle, Alan - Animation of Complex Data Communications Concepts May Not Always Yield improved Learning Outcomes., in Volume 42;
- Using a Network Simulation Tool to Engage Students in Active Learning Enhances Their Understanding of Complex Data Communications Concepts., in Volume 42;
- Tilakaratne, Chandima - Effectiveness of Using Quantified Intermarket Influence for Predicting Trading Signals of Stock Markets, in Volume 70;
- Tilbrook, Marc - Annotating Websites with Machine-processable Information in Controlled Natural Language, in Volume 72;
- Tin, Yiu Shing Terry - Provably Secure Key Exchange: an Engineering Approach, in Volume 21;
- Ting, H. F. - An Optimal Broadcasting Protocol for Mobile Video-on-Demand, in Volume 65;
- Ting, Zhao - 3D Reconstruction of Single Picture, in Volume 36;
- Tjondronegoro, Dian - A Statistical-driven Approach for Automatic Classification of Events in AFL Video Highlights, in Volume 38;
- Extensible Detection and Indexing of Highlight Events in Broadcasted Sports Video, in Volume 48;
- Todd, E. - What Makes a Good User Interface Pattern Language?, in Volume 28;
- Tojo, Satoshi - IC-based Ontology Expansion in Devouring Accessibility, in Volume 58;
- Logical Aspects of Events: Quantification, Sorts, Composition and Disjointness, in Volume 58;
- Tokoro, Ken - Improvements of TLAESA Nearest Neighbour Search Algorithm and Extension to Approximation Search, in Volume 48;
- Toleman, Mark - An evaluation of electronic individual peer assessment in an introductory programming course, in Volume 88;
- Chick Sexing and Novice Programmers: Explicit Instruction of Problem Solving Strategies, in Volume 52;
- Introductory Programming: What's Happening Today and Will There Be Anyone to Teach Tomorrow?, in Volume 30;
- Language Tug-Of-War: Industry Demand and Academic Choice, in Volume 20;
- Teaching and Assessing Programming Strategies Explicitly, in Volume 95;
- Tolhurst, Denise - A New Approach to a First Year Undergraduate Information Systems Course, in Volume 20;
- Do map drawing styles of novice programmers predict success in programming? A multi-national, mulit-institutional study, in Volume 52;
- Organisational Factors Affecting Teachers' Use and Perception of Information & Communications Technology, in Volume 46;
- The Influence of Web-supported Independent Activities and Small Group Work on Students' Epistemological Beliefs, in Volume 30;
- Tomas, R. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
- Tombs, David - Measuring Railway Signals Passed At Danger, in Volume 86;
- Tomita, Etsuji - Protein Side-chain Packing Problem: A Maximum Edge-weight Clique Algorithmic Approach, in Volume 29;
- Tomita, Kohji - The Relative Completeness of a Version of CTL*, in Volume 41;
- Tomita, Shinji - Spatial analysis of centralization and decentralization in the population migration network, in Volume 60;
- Toney, Aaron P. - Modeling Reach For Use in User Interface Design, in Volume 64;
- Toper, Rodney - Rewriting General Conjunctive Queries Using Views, in Volume 5;
- Topor, Rodney - Removing XML Data Redundancies Using Functional and Equality-Generating Dependencies, in Volume 39;
- Toshniwal, Durga - Finding Similarity in Time Series Data by Method of Time Weighted Moments, in Volume 39;
- Townley, David - Concept Instance Sketching and Design for a Biological Database Framework, in Volume 83;
- Towsey, Michael W. - Bacterial Promoter Modeling and Prediction for E. Coli and B. Subtilis with Beagle, in Volume 73;
- Toyn, Ian - Transformation Rules for Z, in Volume 94;
- Toyoda, Masashi - WEB Community Mining and WEB Log Mining: Commodity Cluster Based Execution, in Volume 5;
- Tran, Kha - Indoor Location Prediction Using Multiple Wireless Received Signal Strengths, in Volume 87;
- Tran, Minh Hong - Extended Radar View and Modification Director: Awareness Mechanisms for Synchronous Collaborative Authoring, in Volume 50;
- SWIM: An Alternative Interface for MSN Messenger, in Volume 64;
- Tran, Tien - Combining Structure and Content Similarities for XML Document Clustering, in Volume 87;
- Tran, Van T. K. - Mobile Information Exchange and Integration: From Query to Application Layer, in Volume 92;
- Trawick-Smith, Jeff - The Role of the Teacher in Scaffolding Children's Interactions in a Technological Environment: How a Technology Project is Transforming Preschool Teacher Practices in Urban Schools, in Volume 34;
- Traynor, Des - Automated Assessment in CS1, in Volume 52;
- Trentelman, Kerry - Factorising Temporal Specifications, in Volume 41;
- Tretiakov, Alexei - Using Reflection for Querying XML Documents, in Volume 49;
- Trigueiros, Maria Jos - A Data Quality Metamodel Extension to CWM, in Volume 67;
- Trinh, Thu - Constraint Acquisition - You Can Chase but You Cannot Find, in Volume 79;
- Know your Limits: Enhanced XML Modeling with Cardinality Constraints, in Volume 83;
- Trinidad, Sue - A Journey of Networking Learners Down Under: A Reflection of the Evolution of ICT in Western Australian Primary Schools, in Volume 8;
- Tripathi, Praveen Kumar - Identifying Stock Similarity Based on Multi-event Episodes, in Volume 87;
- Tritilanunt, Suratose - Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets, in Volume 62;
- Truong, Nghi - A Web Based Environment for Learning to Program, in Volume 16;
- Automated Feedback for 'Fill in the Gap' Programming Exercises, in Volume 42;
- Static Analysis of Students' Java Programs, in Volume 30;
- Truyen, Tran The - Preference Networks: Probabilistic Models for Recommendation Systems, in Volume 70;
- Tsai, Jeffery - Modelling and Simulation of Routing Protocol for Mobile Ad Hoc Networks Using Coloured Petri Nets, in Volume 12;
- Tsang, W.W. - Tuning the Collision Test for Power, in Volume 26;
- Tse - Enabling Resource-Awareness for In-Network Data Processing in Wireless Sensor Networks, in Volume 75;
- Tse, Edward - Rapidly Prototyping Single Display Groupware through the SDGToolkit, in Volume 28;
- Tso, C.W. - Tuning the Collision Test for Power, in Volume 26;
- Tsoi, Ah Chung - A ConceptLink Graph for Text Structure Mining, in Volume 91;
- Tsukamoto, Masahiko - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
- Tu, Jiyuan - A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68;
- Tu, Yu-Cheng - Preliminary Security Specification for New Zealand's igovt System, in Volume 98;
- Tue, Minh - Graphics Hardware based Efficient and Scalable Fuzzy C-Means Clustering, in Volume 87;
- Tun, Nwe Ni - IC-based Ontology Expansion in Devouring Accessibility, in Volume 58;
- Semantic Enrichment in Ontologies for Matching, in Volume 72;
- Tuovinen, Juhani E. - Designing Better CBL than Face-to-Face Tutoring by Incorporating Teacher-like Feedback and Guidance in Accounting, in Volume 8;
- Gestalt Theory in Visual Screen Design - A New Look at an Old Subject, in Volume 8;
- Tupakula, Udaya Kiran - A Practical Method to Counteract Denial of Service Attacks, in Volume 16;
- Analysis of Traceback Techniques, in Volume 54;
- Turcsanyi-Szabo, Marta - Drawing a Parallel between Computational Metaphors, Processes, Games and Learning at an Early Age , in Volume 34;
- Turner, Daniel - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
- Turpin, Andrew - An Approach to Phrase Selection for Offline Data Compression, in Volume 4;
- An Investigation on a Community's Web Search Variability, in Volume 74;
- Do Clarity Scores for Queries Correlate with User Performance?, in Volume 27;
- Suffix Arrays: What Are They Good For?, in Volume 49;
- Turull-Torres, Jose Maria - On the Computation of Approximations of Database Queries, in Volume 27;
- Tutty, Jodi - Experiences from a Wireless-enabled Tablet Classroom, in Volume 42;
- Information Technology Online: A Knowledge Framework for Curriculum Externalisation, in Volume 52;
- Tablet classroom interactions, in Volume 52;
- Twardy, Charles - Layout of Bayesian Networks, in Volume 38;
- Tweats, Rob - Thinking Skills and ICT Use in the Classroom?, in Volume 23;
- Tyerman, Susan P. - Reducing Cognitive Overhead on the World Wide Web, in Volume 4;
- Tynan, Richard - Garment-Based Body Sensing Using Foam Sensors, in Volume 50;
- Tyrelle, Greg D. - A Platform for the Description, Distribution and Analysis of Genetic Polymorphism Data, in Volume 19;
Top of ListU - Ueda, Eduardo T. - A New Version of the RC6 Algorithm, Stronger against \chi^2 Cryptanalysis, in Volume 98;
- Uemura, Shunsuke - A Path-based Relational RDF Database, in Volume 39;
- Uitdenbogerd, Alexandra - A Comparative Study of Probabalistic and Language Models for Information Retrieval, in Volume 75;
- Uitdenbogerd, Alexandra L. - Automatic Music Classification Problems, in Volume 26;
- Music Ranking Techniques Evaluated, in Volume 4;
- Ullman, Jeffrey D. - Gradiance On-Line Accelerated Learning, in Volume 38;
- Ulm, Sean - Grid services for e-archaeology, in Volume 82;
- Umer, Muhammad - Learning Dynamics of Pesticide Abuse through Data Mining, in Volume 32;
- Umigai, Akimichi - Design and Implementation of DB-MAN Alpha: Does Database Migration Work Well in a Real Environment?, in Volume 5;
- Upstill, Trystan - How Valuable is External Link Evidence When Searching Enterprise Webs?, in Volume 27;
- Urting, David - A Tool for Component Based Design of Embedded Software, in Volume 10;
- Utting, Mark - Transformation Rules for Z, in Volume 94;
- Uustalu, Tarmo - Compositional Type Systems for Stack-Based Low-Level Languages, in Volume 51;
- Uzun, Alper - THEMATICS is Effective for Active Site Prediction in Comparative Model Structures, in Volume 29;
Top of ListV - Vadaharajan, Vijay - A Secure Mental Poker Protocol over the Internet, in Volume 21;
- Vadapalli, Soujanya - View Relevance Driven Materialized View Selection in Data Warehousing Environment, in Volume 5;
- Vaidya, Jaideep - An Architecture for Privacy-preserving Mining of Client Information, in Volume 14;
- Valaskala, Keeko - Why should we bore students when teaching CS?, in Volume 88;
- Vale, Paul - Having Fun and Raising Standards, in Volume 34;
- Vallance, Scott - Multi-Perspective Images for Visualisation, in Volume 11;
- Rendering Multi-Perspective Images with Trilinear Projection, in Volume 48;
- Valls, M. - Isogeny cordillera algorithm to obtain cryptographically good elliptic curves, in Volume 68;
- Valluri, Satyanarayana R. - View Relevance Driven Materialized View Selection in Data Warehousing Environment, in Volume 5;
- Valverde, Francisco - An Abstract Interaction Model for a MDA Software Production Method, in Volume 83;
- Vamplew, Peter - An Anti-Plagiarism Editor for Software Development Courses, in Volume 42;
- Inference of Gene Expression Networks Using Memetic Gene Expression Programming, in Volume 91;
- Using Corpus Analysis to Inform Research into Opinion Detection in Blogs, in Volume 70;
- Van Achteren, Tanja - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
- Van Baelen, Stefan - A Tool for Component Based Design of Embedded Software, in Volume 10;
- Van Berendonck, Christopher - Bubbleworld : A New Visual Information Retreival Technique, in Volume 24;
- van Bommel, P. - Transformation selection for aptness-based web retrieval, in Volume 39;
- van den Berg, L. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
- van der Aalst, Wil - On the Correlation between Process Model Metrics and Errors, in Volume 83;
- van der Aalst, Wil M.P. - On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling, in Volume 53;
- van der Meyden, Ron - A Linear Time Algorithm for Pricing European Sequential Barrier Options, in Volume 65;
- van Dieten, H. - Slash 21 : A New School and a New Way of Learning, in Volume 23;
- van Gils, B. - Transformation selection for aptness-based web retrieval, in Volume 39;
- van Kouwen, Frank - Improving Environmental Decision-making: Bridging the Gap between Conceptual Modelling and Quantitative Analyses with Quasta, in Volume 83;
- Vandewoude, Yves - A Tool for Component Based Design of Embedded Software, in Volume 10;
- Vandierendonck, Hans - Optimizing a 3D Image Reconstruction Algorithm: Investigating the Interaction between the High-Level Implementation, the Compiler and the Architecture, in Volume 6;
- Vanoirbeek, C. - Automating XML document Transformations: A conceptual modelling based approach, in Volume 31;
- Vanselow, Kerstin - 2D Visualisation of SMFS Data on Membrane Proteins, in Volume 83;
- Varadharajan, Vijay - A Practical Method to Counteract Denial of Service Attacks, in Volume 16;
- Analysis of Traceback Techniques, in Volume 54;
- Vartiainen, Tero - Student life in computing: a variety of conflicting moral requirements, in Volume 78;
- Vasudevan, Amit - A High Performance Kernel-Less Operating System Architecture, in Volume 38;
- SPiKE: Engineering Malware Analysis Tools using Unobtrusive Binary-Instrumentation, in Volume 48;
- Vasudevan, Venkatesh - Implementation of a Triple Modular Redundant FPGA based Safety Critical Systems for Reliable Software Execution, in Volume 69;
- Vaughan, Francis A. - Communication Performance Issues for Two Cluster Computers, in Volume 16;
- Veelo, Nicole - Conditions and Possibilities for Integration of ICT in Open Teaching in Secondary Schools - A Comparative Study in Preparation, in Volume 23;
- Velikovsky, Joe - Outdoor Augmented Reality Gaming on Five Dollars a Day, in Volume 40;
- Venables, Anne - Programming students need instant feedback!, in Volume 20;
- Venkatesan, Ramarathnam - Comparison of Texts Streams in the Presence of Mild Adversaries, in Volume 44;
- Venkatesh, Svetha - Indoor Location Prediction Using Multiple Wireless Received Signal Strengths, in Volume 87;
- Preference Networks: Probabilistic Models for Recommendation Systems, in Volume 70;
- Venugopal, Srikumar - A Dynamic Job Grouping-Based Scheduling for Deploying Applications with Fine-Grained Tasks on Global Grids, in Volume 44;
- A Portal for Grid-enabled Physics, in Volume 44;
- Verbyla, Janet L.M. - An Online Programming Assessment Tool, in Volume 20;
- Verelst, Jan - When are two Workflows the Same?, in Volume 41;
- Verenikina, Irina - Child's Play: Computer Games, Theories of Play and Children's Development, in Volume 34;
- Verheecke, Bart - Specifying and Implementing the Operational Use of Constraints in Object-Oriented Applications, in Volume 10;
- Verity, Dominic R. - A Pattern Enforcing Compiler (PEC) for Java: Using the Compiler, in Volume 43;
- Vernik, Michael - e-Ghosts: Leaving Virtual Footprints in Ubiquitous Workspaces, in Volume 28;
- Vernik, Rudi - e-Ghosts: Leaving Virtual Footprints in Ubiquitous Workspaces, in Volume 28;
- Enterprise-Enabled Ubiquitous Workspaces, in Volume 25;
- Information Visualisation using Composable Layouts and Visual Sets, in Volume 9;
- Interaction Modes for Augmented Reality Visualization, in Volume 9;
- Keg Master : a Graph-Aware Visual Editor for 3D Graphs, in Volume 18;
- Rapid Assembly and Deployment of Domain Visualisation Solutions, in Volume 9;
- Tangible User Interaction Using Augmented Reality, in Volume 7;
- Verrijn-Stuart, A.A. - On Utility-based Selection of Architecture-Modelling Concepts, in Volume 43;
- Vesisenaho, Mikko - Contextualising information and communications technology in developing countries, in Volume 88;
- Vikas, Om - Multilingual ICT Education: Language Observatory as a Monitoring Instrument, in Volume 46;
- Vilela, Valerio Moyses - Improving Productivity and Quality of GIS Databases Design using an Analysis Pattern Catalog, in Volume 43;
- Vilkomir, Sergiy A. - Segregated Failures Model for Availability Evaluation of Fault-Tolerant Systems, in Volume 48;
- Viller, Stephen - Talking about watching: Using the Video Card Game and wiki-web technology to engage IT students in developing observational skills, in Volume 20;
- Vincent, Jill - A Technological Environment for Promoting Mathematical Reasoning : A Dynamic Approach to Geometric Proof, in Volume 23;
- Vincent, John - Individual Differences, Technology and the Teacher of the Future, in Volume 23;
- MicroWorlds and the Integrated Brain, in Volume 8;
- Violich, Stephen - Combinatorial Generation by Fusing Loopless Algorithms, in Volume 51;
- Viswanathan, Kapali - Five Sealed-bid Auction Models, in Volume 21;
- Vitter, Jeffery S. - Aggregate Predicate Support in DBMS, in Volume 5;
- Volkmer, Timo - Exploring Human Judgement of Digital Imagery, in Volume 62;
- Video Cut Detection using Frame Windows, in Volume 38;
- Volkov, Vasily - Cloth Animation with Adaptively Refined Meshes, in Volume 38;
- von Konsky, Brian R. - Assessing the capability and maturity of capstone software engineering projects, in Volume 78;
- Engaging Undergraduates in Discussions about Ethics in Computing, in Volume 66;
- The Benefit of Information Technology in Managing Outcomes Focused Curriculum Development Across Related Degree Programs, in Volume 52;
- Using PSP to Evaluate Student Effort in Achieving Learning - Outcomes in a Software Engineering Assignment, in Volume 42;
- Vossen, Gottfried - ActiveTags: Making Tags More Useful Anywhere on the Web, in Volume 92;
- Modelling Web-Oriented Architectures, in Volume 96;
- Vu, Linh - Hierarchical Verification Environment, in Volume 55;
- Vuylsteker, Pascal - eScience Curricula at Two Australian Universities, in Volume 42;
- Vyatkina, Kira - Linear Axis for Planar Straight Line Graphs, in Volume 94;
Top of ListW - Wagenhals, Lee W. - Operational Planning using Web-Based Interfaces to a Coloured Petri Net Simulator of Influence Nets, in Volume 12;
- Synthesizing Executable Models of Object Oriented Architectures, in Volume 12;
- Wagner, Michael - Audio-Visual Multimodal Fusion for Biometric Person Authentication and Liveness Verification, in Volume 57;
- Video to the Rescue, in Volume 56;
- Wahlstrom, Kirsten - On the Impact of Knowledge Discovery and Data Mining, in Volume 1;
- The motivation and proposition of a privacy-enhancing architecture for operational databases, in Volume 68;
- Waldeck, Peter - Implementation of a Triple Modular Redundant FPGA based Safety Critical Systems for Reliable Software Execution, in Volume 69;
- Walker, Cecily - Transforming learning of programming: a mentoring project, in Volume 78;
- Wallace, Andrew - Rapid Visual Flow: How Fast Is Too Fast?, in Volume 28;
- Wan Zainon, Wan Nazmee - Visualising Phylogenetic Trees, in Volume 50;
- Wan, Jacky W.W. - Mining Association Rules from XML Data using XQuery, in Volume 32;
- Wanas, Nayer - A Study of Local and Global Thresholding Techniques in Text Categorization, in Volume 61;
- Wand, Yair - A Framework Supporting the Utilization of Domain Knowledge Embedded in Software, in Volume 83;
- Wandmacher, Tonio - Extraction, evaluation and integration of lexical-semantic relations for the automated construction of a lexical ontology, in Volume 85;
- Wang, Bill B. - A Comparative Study for Domain Ontology Guided Feature Extraction, in Volume 16;
- Wang, Bo - A Combined Model and a Varied Gibbs Sampling Algorithm Used for Motif Discovery, in Volume 29;
- Wang, Daolong - Mega Weaver: A Simple Iterative Approach for BAC Consensus Assembly, in Volume 29;
- Wang, Guoren - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75;
- M+-tree : A New Dynamical Multidimensional Index for Metric Spaces, in Volume 17;
- Wang, Hao - BLAST++ : A Tool for BLASTing Queries in Batches, in Volume 19;
- Wang, Henry C. - Cataloging and Search Engine for Video Library, in Volume 2;
- Wang, Honghui - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
- Wang, Hongshu - A Statistical Method for Assessment of 3-D Medical Image Registration, in Volume 2;
- Wang, Hua - A Comparative Study of Classification Methods For Microarray Data Analysis, in Volume 61;
- A Flexible Payment Scheme and its Permission-Role Assignment, in Volume 16;
- A Framework for Role-based group delegation in distributed environment, in Volume 48;
- A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses, in Volume 61;
- A Maximally Diversified Multiple Decision Tree Algorithm for Microarray Data Classification, in Volume 73;
- An efficient hash-based algorithm for minimal k-anonymity, in Volume 74;
- Anonymous Access Scheme for Electronic Services, in Volume 26;
- Authorization Algorithms for the Mobility of User-Role Relationship, in Volume 38;
- Conditional Purpose Based Access Control Model for Privacy Protection, in Volume 92;
- Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations, in Volume 17;
- Integrating Recommendation Models for Improved Web page prediction accuracy, in Volume 74;
- Microdata Protection Through Approximate Microaggregation, in Volume 91;
- Priority Driven K-Anonymisation for Privacy Protection, in Volume 87;
- Privacy-aware Access Control with Generalization Boundaries, in Volume 91;
- Ticket-Based Service Access Scheme for Mobile Users, in Volume 4;
- Wang, Huaqing - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38;
- Wang, Huaxiong - Formal Analysis of Card-based Payment Systems in Mobile devices, in Volume 54;
- Formal Security Analysis of Australian E-passport Implementation, in Volume 81;
- Wang, J. R. - Survey of Sports Video Analysis: Research Issues and Applications, in Volume 36;
- Wang, Jing - 2D Visualisation of SMFS Data on Membrane Proteins, in Volume 83;
- Wang, Junhu - Removing XML Data Redundancies Using Functional and Equality-Generating Dependencies, in Volume 39;
- Rewriting General Conjunctive Queries Using Views, in Volume 5;
- Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75;
- Wang, Lijian - Roller Interface for Mobile Device Applications, in Volume 64;
- Wang, Lusheng - Exact Pattern Matching for RNA Secondary Structures, in Volume 29;
- Wang, Meiqing - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38;
- Wang, Qiang - Experiences in Developing a Node of an International Computational Physics Data Grid, in Volume 82;
- Wang, Qing - A Heuristic Approach to Cost-Efficient Derived Horizontal Fragmentation of Complex Value Databases, in Volume 63;
- A Heuristic Approach to Cost-Efficient Fragmentation and Allocation of Complex Value Databases, in Volume 49;
- A Typed Higher-Order Calculus for Querying XML Databases, in Volume 75;
- Deriving Relation Keys from XML Keys, in Volume 17;
- Line Drawing in Virtual Reality using a Game Pad, in Volume 50;
- Wang, R. - Media Streaming Synchronisation and Video Interaction : A Survey, in Volume 22;
- Wang, Ruiyi - The Development of an Online Video Browing System, in Volume 11;
- Wang, Tsuo-Jung - Calculating the Meeting Point of Scattered Robots on Weighted Terrain Surfaces, in Volume 41;
- Wang, Wei - Path Materialization Revisited: An Efficient Storage Model for XML Data, in Volume 5;
- Wang, Xianbing - DGRID: A DHT-Based Resource Indexing and Discovery Scheme for Computational Grids, in Volume 68;
- Wang, Xiaoxing - A Quantitative Analysis for Decomposing Visual Signal of the Gaze Displacement, in Volume 11;
- Visual Representation Model for Motion Direction Selectivity, in Volume 22;
- Wang, Xing - Building Multi-Device, Component-based, Thin-client Groupware: Issues and Experiences, in Volume 7;
- Wang, Xiu Ying - Elastic Medical Image Registration Based on Image Intensity, in Volume 11;
- Novel Elastic Registration for 2-D Medical and Gel Protein Images, in Volume 19;
- Wang, Yefeng - An Automated System for Conversion of Clinical Notes into SNOMED Clinical Terminology, in Volume 68;
- Wang, Zhong - Student timesheets can aid in curriculum coordination, in Volume 66;
- Ward, Roberta - Funktion Zusammen: Two Schools, One Class and German LOTE in Rural Queensland, in Volume 8;
- Wark, Tim - Audio-Visual Speaker Verification using Continuous Fused HMMs, in Volume 56;
- Warner, John W. - An Empirical Study of Junior Secondary Students' Expression of Algorithms in Natural Language, in Volume 8;
- Warren, Ian - Automated Usability Testing Framework, in Volume 76;
- Teaching Patterns and Software Design, in Volume 42;
- Warren, James R. - Automatically Generated Consumer Health Metadata Using Semantic Spaces, in Volume 80;
- Evaluation of User Satisfaction and Learnability for Outdoor Augmented Reality Gaming, in Volume 50;
- Towards an Architecture for Quality Audit Reporting to Improve Hypertension Management, in Volume 80;
- Warren, Matthew - The Issue of Ethics in Electronic Commerce, in Volume 1;
- Warren, P.R. - Interactive Visualisation of Large Multivariate Datasets on the World-Wide Web, in Volume 9;
- Warren, Paul - Detecting Stress in Spoken English using Decision Trees and Support Vector Machines, in Volume 32;
- Warren, Peter - Learning Models for English Speech Recognition, in Volume 26;
- Learning to Program: Spreadsheets, Scripting and HCI, in Volume 30;
- Washizaki, Hironori - Dynamic Hierarchical Undo Facility in a Fine-Grained Component Environment, in Volume 10;
- Wassen, Martin J. - Improving Environmental Decision-making: Bridging the Gap between Conceptual Modelling and Quantitative Analyses with Quasta, in Volume 83;
- Watanabe, Isamu - Generation of Relevance Maps and Navigation in A Digital Book, in Volume 60;
- Watson, Richard - A Framework for Role-based group delegation in distributed environment, in Volume 48;
- An evaluation of electronic individual peer assessment in an introductory programming course, in Volume 88;
- Chick Sexing and Novice Programmers: Explicit Instruction of Problem Solving Strategies, in Volume 52;
- Incorporating programming strategies explicitly into curricula, in Volume 88;
- Introductory Programming: What's Happening Today and Will There Be Anyone to Teach Tomorrow?, in Volume 30;
- Language Tug-Of-War: Industry Demand and Academic Choice, in Volume 20;
- Peer-to-Peer Form Based Web Information Systems, in Volume 49;
- Teaching and Assessing Programming Strategies Explicitly, in Volume 95;
- Towards a Definition and Model for Metadata File Systems, in Volume 74;
- Weaver, Rob - A Pragmatic Approach to Reasoning about the Assurance of Safety Arguments, in Volume 33;
- Webb, Darren - Extensible Job Managers for Grid Computing, in Volume 16;
- Webb, Geoff - Multi-Strategy Ensemble Learning, Ensembles of Bayesian Classifiers, and the Problem of False Discoveries, in Volume 87;
- Webb, Ian - Raising the Standards : ICT and the Teacher of the Future, in Volume 23;
- Webb, Ivan - A Systems Approach to ICT in School Education , in Volume 34;
- Webber, Richard - Visualisation of the Minority Game Using a Mod, in Volume 35;
- Weber, Derek - An Architecture for Multi-View Information Overlays, in Volume 35;
- Weber, Gerald - A Platform-Independent Approach for Auditing Information Systems, in Volume 80;
- User Interface Layout with Ordinal and Linear Constraints, in Volume 50;
- Weckert, John - Computer Ethics - Why Bother?, in Volume 1;
- Introduction - Computers and Philosophy, in Volume 37;
- Wee, Hui - Optimal Joint Vendor-Buyer Inventory Strategy for Deteriorating Items with Salvage Value, in Volume 77;
- Weghorn, Hans - Vowel recognition of English and German language using Facial movement(SEMG) for Speech control based HCI, in Volume 56;
- Weinstein, David M. - Biomedical Computing and Visualization, in Volume 48;
- Weir, Michael - Forward Chaining for Robot and Agent Navigation using Potential Fields, in Volume 26;
- Weiskopf, D. - Non-invasive Adaptation of Black-box User Interfaces, in Volume 18;
- Welch, Ian - A Board Game for Teaching Internet Engineering, in Volume 52;
- Using Remotely Executing Software via a Mobile Device, in Volume 93;
- Wells, Barbara - Using a Maze Case Study to Teach Object-Oriented Programming and Design Patterns, in Volume 30;
- Wells, Lisa - Dynamic Design and Evaluation of Software Architecture in Critical Systems Development, in Volume 69;
- Wells, Marilyn A - Conversational KM - Student Driven Learning, in Volume 30;
- Wells, Marilyn A. - Commonsense ISD: An Empirical Approach to Teaching Systems Analysis and Design, in Volume 42;
- Welzer, Tatjana - Early Assessment of Classification Performance, in Volume 32;
- Wende, M. - Device Driver Programming in a Transactional DSM Operating System, in Volume 6;
- Wendelborn, Andrew L. - A Simplified Approach to Web Service Development, in Volume 54;
- Alias Analysis for Exceptions in Java, in Volume 4;
- Extensible Job Managers for Grid Computing, in Volume 16;
- Stream-Components: Component based Stream computation on the Grid, in Volume 99;
- Weng, Cheng G. - A New Evaluation Measure for Imbalanced Datasets, in Volume 87;
- Werstein, Paul - Supporting Large Scale eResearch Infrastructures with Adapted Live Streaming Capabilities, in Volume 82;
- Wesson, J.L. - Interactive Visualisation of Large Multivariate Datasets on the World-Wide Web, in Volume 9;
- Whalley, Jacqueline - Bloom's Taxonomy for CS assessment, in Volume 78;
- Decoding Doodles: Novice Programmers and Their Annotations, in Volume 66;
- Interoperability for Geospatial Analysis: a Semantics and Ontology-based Approach, in Volume 63;
- The BRACElet 2009.1 (Wellington) Specification, in Volume 95;
- The teaching of novice computer programmers: bringing the scholarly-research approach to Australia, in Volume 78;
- Whalley, Jacqueline L. - An Australasian Study of Reading and Comprehension Skills in Novice Programmers, using the Bloom and SOLO Taxonomies, in Volume 52;
- Whigham, Peter - On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma, in Volume 26;
- While, Lyndon - An Implementation of Parallel Pattern-Matching via Concurrent Haskell, in Volume 4;
- Optimising Parallel Pattern-matching by Source-level Program Transformation, in Volume 38;
- Path-Planning by Tessellation of Obstacles, in Volume 16;
- While, R. Lyndon - A Dynamic Communication Algorithm for Digital Halftoning, in Volume 4;
- White, Barbara - Experiences from a Wireless-enabled Tablet Classroom, in Volume 42;
- White, Barbera - Information Technology Online: A Knowledge Framework for Curriculum Externalisation, in Volume 52;
- Tablet classroom interactions, in Volume 52;
- White, Hayley - Usability Evaluation of Library Online Catalogues, in Volume 50;
- Whiting, Leigh - Boolean Affine Approximation with Binary Decision Diagrams, in Volume 94;
- Whitmore, Thomas - Extending a Persistent Object Framework to Enhance Enterprise Application Server Performance, in Volume 5;
- Wiander, Timo - Implementing the ISO/IEC 17799 standard in practice - experiences on audit phases, in Volume 81;
- Wiangsripanawan, Rungrat - Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks, in Volume 68;
- Wieczorek-Ghisso, Katazyna - Digital Communication of Children's Co-constructing Hypothesis, Negotiating Documentation Methods, in Volume 34;
- Wiggberg, Mattias - Computer science students' experiences of decision making in project groups, in Volume 88;
- Students learn CS in different ways: insights from an empirical study, in Volume 78;
- Wigley, Grant - Hand Tracking For Low Powered Mobile AR User Interfaces, in Volume 40;
- The Management of Applications for Reconfigurable Computing using an Operating System, in Volume 6;
- Wijffels, Gene - Towards an understanding of protein-protein interaction network heirarchies. Analysis of DnaN-binding peptide motifs in members of protein families interacting with the eubacterial processivity clamp, the subunit of DNA Polymerase III, in Volume 19;
- Wilcke, Winfried W. - Computer Architecture Challenges in the Next Ten Years, in Volume 6;
- Wildman, Luke - Guidance for Def (Aust) 5679 Issue 2, in Volume 100;
- Requirements Reformulation using Formal Specification: A Case Study, in Volume 12;
- Wiles, Janet - Evolving Genetic Regulatory Networks Using an Artificial Genome, in Volume 29;
- Wilkerson, Trena L. - Multiple Platform Videoconferencing to Support Teacher Education and Professional Development in Mathematics, in Volume 23;
- Wilkins, Kevin - The Gestalt Principles of Similarity and Proximity Apply to Both the Haptic and Visual Grouping of Elements, in Volume 64;
- Williams, Aaron - Generating Balanced Parentheses and Binary Trees by Prefix Shifts, in Volume 77;
- Williams, Adepele - Controlling Inference: Avoiding P-level Reduction during Analysis, in Volume 68;
- Williams, Ed - Airborne Collision Avoidance System, in Volume 47;
- Williams, Graham - A Delivery Framework for Health Data Mining and Analytics, in Volume 38;
- Williams, Graham J. - Exploratory Multilevel Hot Spot Analysis: Australian Taxation Office Case Study, in Volume 70;
- Williams, Hugh E. - Access-Ordered Indexes, in Volume 26;
- Genomic Information Retrieval, in Volume 17;
- In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems, in Volume 26;
- Indexing for Fast Categorisation, in Volume 16;
- Stemming Indonesian, in Volume 38;
- Variable-length Intervals in Homology Search, in Volume 29;
- Video Cut Detection using Frame Windows, in Volume 38;
- Williams, Kylie - Verification of the Futurebus+ Cache Coherence protocol: A case study in model checking, in Volume 26;
- Williams, Mary-Anne - Ontology Based Object Categorisation for Robots, in Volume 58;
- Williams, Neville - Flexible Learning - Maximising Flexibility in a Subject with Large Student Numbers, in Volume 30;
- Williams, R.N. - An online tool for learning collaboration and learning while collaborating., in Volume 52;
- Wilson, David - What Our ICT Graduates Need from Us: A Perspective from the Workplace, in Volume 95;
- Wilson, Laurence S. - Automatic Extraction of Lung Boundaries by a Knowledge-Based Method, in Volume 2;
- Detection and Measurement of Hilar Region in Chest Radiograph, in Volume 22;
- Detection of Abnormal Texture in Chest X-rays with Reduction of Ribs, in Volume 36;
- Texture Classification using Multi-Scale Scheme, in Volume 36;
- Winikoff, Michael - An Open Meteorological Alerting System: Issues and Solutions, in Volume 26;
- Applying Conflict Management Strategies in BDI Agents for Resource Management in Computational Grids, in Volume 4;
- Winn, Tiffany - A Pattern Language for Pattern Language Structure, in Volume 13;
- Winter, K. - Tool Support for Checking Railway Interlocking Designs, in Volume 55;
- Winter, Kirsten - Model Checking Railway Interlocking Systems, in Volume 4;
- Modelling Large Railway Interlockings and Model Checking Small Ones, in Volume 16;
- Winter, P. - Some Structural and Geometric Properties of Two-Connected Steiner Networks, in Volume 65;
- Winters, Titus - TinkerNet: A Low-Cost and Ready-To-Deploy Networking Laboratory Platform, in Volume 52;
- TinkerNet: A Low-Cost Networking Laboratory, in Volume 30;
- Winton, Lyle J. - A Simple Virtual Organisation Model and Practical Implementation, in Volume 44;
- Wiseman, Lorraine - Communicate in an E-Learning Community , in Volume 34;
- Wishart, Ryan - Asad Pirzada, Ryan Wishart, Marius Portmann and Jadwiga Indulska, in Volume 91;
- SuperstringRep: Reputation-enhanced Service Discovery, in Volume 38;
- Witt, Rebecca J. - Reducing Cognitive Overhead on the World Wide Web, in Volume 4;
- Wobcke, Wayne - A BDI Agent Architecture for Dialogue Modelling and Coordination in a Smart Personal Assistant, in Volume 57;
- Wohed, Petia - On the Suitability of UML 2.0 Activity Diagrams for Business Process Modelling, in Volume 53;
- Wojnar, Maciej - HOPPER: a hierarchical planning agent for unpredictable domains, in Volume 91;
- Wolf, Christian - iWeaver: Towards 'Learning Style'-based e-Learning in Computer Science Education, in Volume 20;
- Wolff, Rodney - News Aware Volatility Forecasting: Is the Content of News Important?, in Volume 70;
- What Types of Events Provide the Strongest Evidence that the Stock Market is Affected by Company Specific News?, in Volume 61;
- Wollowski, Michael - Evolution of an International Collaborative Student Project, in Volume 95;
- Won, Hong-Hee - Machine Learning in DNA Microarray Analysis for Cancer Classification, in Volume 19;
- Wong, Allan K. Y. - A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow Adaptively, in Volume 38;
- Wong, Felix - CONFER: Towards Groupware for Building Consensus in Collaborative Software Engineering, in Volume 64;
- Wong, Kee Yew - Support Vector Machine Approach for Cancer Detection Using Amplified Fragment Length Polymorphism (AFLP) Screening Method, in Volume 29;
- Wong, Kenneth - Algebraic Analysis of LEX, in Volume 98;
- Wong, Kenneth Koon-Ho - Faster Group Operations on Elliptic Curves, in Volume 98;
- Wong, Koon-Pong - Functional Segmentation of Dynamic Emission Tomographic images, in Volume 2;
- Non-Invasive estimation of Cerebral Metabolic Rate of Glucose Using Simultaneous Estimation and Cluster Analysis: A feasibility Study, in Volume 2;
- Numerical Deconvolution by a Monte Carlo Approach with Application to Dynamic Cardiac Perfusion Tc-99m SPECT, in Volume 11;
- Wong, Limsoon - From Informatics to Bioinformatics, in Volume 19;
- Use of Built-in Features in the Interpretation of High-dimensional Cancer Diagnosis Data, in Volume 29;
- Wong, Prudence W.H. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
- Wong, Raymond - Shallow NLP techniques for Internet Search, in Volume 48;
- Wong, Raymond K. - A New Approach to Protein Structure and Function Analysis Using Semi-structured Databases, in Volume 19;
- Cooperative Query Answering for Semistructured Data, in Volume 17;
- Currency Exchange Rate Forecasting From News Headlines, in Volume 5;
- Dynamic Labeling Schemes for Ordered XML Based on Type Information, in Volume 49;
- Efficient XQuery Join Processing in Publish/Subscribe Systems, in Volume 92;
- Informative 3D Visualization of Multiple Protein Structures, in Volume 29;
- Mobile Information Exchange and Integration: From Query to Application Layer, in Volume 92;
- Optimizing The Lazy DFA Approach for XML Stream Processing, in Volume 27;
- Optimizing XPath Queries on Streaming XML Data, in Volume 63;
- Querying and Maintaining Ordered XML Data using Relational Databases, in Volume 39;
- Wong, W.F. - Sensitivity Analysis of a Superscalar Processor Model, in Volume 6;
- Wong, Wilson - Determining Termhood for Learning Domain Ontologies in a Probabilistic Framework, in Volume 70;
- Determining Termhood for Learning Domain Ontologies using Domain Prevalence and Tendency, in Volume 70;
- Integrated Scoring For Spelling Error Correction, Abbreviation Expansion and Case Restoration in Dirty Text, in Volume 61;
- Measuring Data-Driven Ontology Changes using Text Mining, in Volume 70;
- Wongthongtham, Pornpit - Differentiating Conceptual Modelling from Data Modelling, Knowledge Modelling and Ontology Modelling and a Notation for Ontology Modelling, in Volume 79;
- Woo, Chaw-Seng - Performance Factors Analysis of a Wavelet-based Watermarking Method, in Volume 44;
- Recovery of Watermark Using Differential Affine Motion Estimation, in Volume 44;
- Woo, Jehak - Alias Analysis for Exceptions in Java, in Volume 4;
- Woo, Jongwook - Alias Analysis for Exceptions in Java, in Volume 4;
- Woodcock, R. - Service Oriented Grid Architecture for Geosciences Community, in Volume 68;
- Woodford, Brendon J. - A Wavelet-Based Neuro-Fuzzy System for Data Mining Small Image Sets, in Volume 32;
- Woodford, Karyn - Multiple Choice Questions Not Considered Harmful, in Volume 42;
- Woodward, Charles - Augmented Interiors with Digital Camera Images, in Volume 50;
- Wright, David A. - Adaptive Cooperative Fuzzy Logic Controller, in Volume 26;
- Wright, Fred A. - Mega Weaver: A Simple Iterative Approach for BAC Consensus Assembly, in Volume 29;
- Wright, Jevon - Survey of Existing Languages to Model Interactive Web Applications, in Volume 79;
- Wright, June L. - The Role of the Teacher in Scaffolding Children's Interactions in a Technological Environment: How a Technology Project is Transforming Preschool Teacher Practices in Urban Schools, in Volume 34;
- Wright, Tim - Evaluation of Two Textual Programming Notations for Children, in Volume 40;
- Moving animation script creation from textual to visual representation, in Volume 50;
- PatternProgrammer: Yet Another Rule-Based Programming Environment for Children, in Volume 50;
- Usability Evaluation of Library Online Catalogues, in Volume 50;
- Using a System of Tutorials and Groups to Teach User Interface Design, in Volume 42;
- Visualisations of Execution Traces (VET): An Interactive Plugin-Based Visualisation Tool, in Volume 50;
- Wu, Baolin - Agent-based Ontology Integration for Ontology-based Applications, in Volume 58;
- Wu, Hong - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
- Wu, Hongwei - Deriving Relation Keys from XML Keys, in Volume 17;
- Wu, Mingfang - An Investigation on a Community's Web Search Variability, in Volume 74;
- Wu, Qiang - Fractal Image Compression on a Pseudo Spiral Architecture, in Volume 38;
- Image Segmentation on Spiral Architecture, in Volume 11;
- Wu, Shuanhu - Microarray Image Processing Based on Clustering and Morphological Analysis, in Volume 19;
- Wu, Sue R. - Screen Capture - A Vector Quantisation Approach, in Volume 36;
- Wu, Xiaoming - A Combined Model and a Varied Gibbs Sampling Algorithm Used for Motif Discovery, in Volume 29;
- Wu, Xiaoyun - A Secure Semi-Fragile Watermarking for Image Authentication Based on Integer Wavelet Transform with Parameters, in Volume 44;
- Wu, Yingxin - The Geodesic Self-Organizing Map and Its Error Analysis, in Volume 38;
- Three Dimensional Colour Pickers, in Volume 45;
- Visualizing Multivariate Network on the Surface of a Sphere, in Volume 60;
- Wu, Yongdong - Counterfeiting Attack on a Lossless Authentication Watermarking Scheme, in Volume 22;
- Wuensche, Burkhard - A Comparison and Evaluation of Interpolation Methods for Visualising Discrete 2D Survey Data, in Volume 35;
- A Framework for InteractiveWeb-Based Visualization, in Volume 50;
- A Survey, Classification and Analysis of Perceptual Concepts and their Application for the Effective Visualisation of Complex Information, in Volume 35;
- Advanced Texturing Techniques for the Effective Visualization of Neoroanatomy from Diffusion Tensor Imaging Data, in Volume 29;
- The Visualization and Measurement of Left Ventricular Deformation, in Volume 19;
- Wuensche, Burkhard C. - Game/Music Interaction - An Aural Interface for Immersive Interactive Environments, in Volume 64;
- Wyatt, Mathew J. - YourSRB: A cross platform interface for SRB and Digital Libraries, in Volume 68;
- Wynn, M. T. - Product Flow Analysis in Distribution Networks with a Fixed Time Horizon, in Volume 74;
- Wynn, Moe Thandar - Synthesis of Orchestrators from Service Choreographies, in Volume 96;
Top of ListX - Xiao, Haili - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
- Xiao, Jianchang - Deriving Relation Keys from XML Keys, in Volume 17;
- Xiao, Yi - Facial Feature Location with Delaunay Triangulation/Voronoi Diagram Calculation, in Volume 11;
- Xie, Huayang - Detecting Stress in Spoken English using Decision Trees and Support Vector Machines, in Volume 32;
- Learning Models for English Speech Recognition, in Volume 26;
- Xie, Zhipeng - LBR-Meta: An Efficient Algorithm for Lazy Bayesian Rules, in Volume 87;
- Xin, Jing - Relevance Feedback for Content-Based Image Retrieval Using Bayesian Network, in Volume 36;
- Xiong, Chaoyue - Modelling and Simulation of Routing Protocol for Mobile Ad Hoc Networks Using Coloured Petri Nets, in Volume 12;
- Xu, Changsheng - Counterfeiting Attack on a Lossless Authentication Watermarking Scheme, in Volume 22;
- Image Mosaics Based on Homogenous Coordinates, in Volume 22;
- Web-based Image Authentication Using Invisible Fragile Watermark, in Volume 11;
- Xu, Guandong - Breast Cancer Survivability via AdaBoost Algorithms, in Volume 80;
- Discovering Task-Oriented Usage Pattern for Web Recommendation, in Volume 49;
- Discovering User Access Pattern Based on Probabilistic Latent Factor Model, in Volume 39;
- Xu, Kai - Database Support For Multiresolution Terrain Visualization, in Volume 17;
- Visual Analysis of Network Centralities, in Volume 60;
- Xu, Lin - Approximate Retrieval of XML Data with ApproXPath, in Volume 75;
- Xu, Richard Y. D. - Media Streaming Synchronisation and Video Interaction : A Survey, in Volume 22;
- Object Tracking Using CamShift Algorithm and Multiple Quantized Feature Spaces, in Volume 36;
- Robust Real-Time Tracking of Non-Rigid Objects, in Volume 36;
- Xu, Shengjin - A Grid Based e-Research Platform for Clinical Management in the Human Respiratory and Vascular System, in Volume 68;
- Xu, Yinfeng - On-demand Bounded Broadcast Scheduling with Tight Deadlines, in Volume 51;
- Xu, Ying - Exact Pattern Matching for RNA Secondary Structures, in Volume 29;
- Xu, Yong - Wearable Microphone Array as User Interface, in Volume 28;
- Xu, Yue - Data Mining For Lifetime Prediction of Metallic Components, in Volume 61;
- Xuan, Thanh Quach - Simple Eight Bit, Emulated Computers for Illustrating Computer Architecture Concepts and Providing a Starting Point for Student Designs, in Volume 66;
- Xue, Jingling - Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading, in Volume 38;
- Strength Reduction for Loop-Invariant Types, in Volume 26;
- Xue, Liyin - A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors, in Volume 16;
Top of ListY - Yacef, Kalina - Making Large Class Teaching More Adaptive With the Logic-ITA, in Volume 30;
- Yamaguchi, Kazuaki - Improvements of TLAESA Nearest Neighbour Search Algorithm and Extension to Approximation Search, in Volume 48;
- Yamakami, Tomoyuki - Quantum List Decoding from Quantumly Corrupted Codewords for Classical Block Codes of Polynomially Small Rate, in Volume 65;
- Yamamoto, Kazuma - Using Attributed Goal Graphs for Software Component Selection: An Application of Goal-Oriented Analysis to Decision Making, in Volume 83;
- Yamashita, Fumiyoshi - Visualization of multi-dimensional data of bioactive chemicals using a hierarchical data visualization technique 'HeiankyoView', in Volume 60;
- Yan, Hong - A Fuzzy Rule-Based Interactive Methodology for Training Multimedia Actors, in Volume 2;
- A Hierarchical Approach in Multilevel Thresholding Based on Maximum Entropy and Bayes' Formula, in Volume 11;
- An Effective Multilevel Thresholding Approach Using Conditional Probability Entropy and Genetic Algorithm, in Volume 22;
- Comparison of Five Conditional Probabilities in 2-Level Image Threshold Based on Bayesian Formulation, in Volume 2;
- Facial Feature Location with Delaunay Triangulation/Voronoi Diagram Calculation, in Volume 11;
- Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges, in Volume 11;
- Gene Expression Data Clustering and Visualization Based on a Binary Heirarchical Clustering Framework, in Volume 19;
- Hidden Line Removal for 2D Cartoon Images, in Volume 11;
- Line Extraction Using Image Carving, in Volume 22;
- Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
- Microarray Image Processing Based on Clustering and Morphological Analysis, in Volume 19;
- Newspaper Document Analysis Featuring Connected Line Segmentation, in Volume 11;
- Quantification of Neural Images using Grey Difference, in Volume 73;
- Reduction of Artifacts in Cosine Transform Coded Images, in Volume 11;
- Region Matching by Optimal Fuzzy Dissimilarity, in Volume 2;
- Vectorization of Cartoon Drawings, in Volume 2;
- Yan, Xin - Document Generality: its Computation for Ranking, in Volume 49;
- Yan, Yanxin - Wearable Microphone Array as User Interface, in Volume 28;
- Yang, Biao - An environment for developing adaptive, multi-device user interfaces, in Volume 18;
- Yang, Chi - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75;
- Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75;
- Yang, Dongqiang - Automatic Thesaurus Construction, in Volume 74;
- Measuring Semantic Similarity in the Taxonomy of WordNet, in Volume 38;
- Yang, Doris Dongsheng - How does internationalisation affect learning and teaching of computer science: a study at Tongji University in China, in Volume 88;
- Yang, Hong Yul - A Solar System Metaphor for 3D Visualisation of Object Oriented Software Metrics, in Volume 35;
- Yang, Jeongmo - Secure Key Issuing in ID-based Cryptography, in Volume 32;
- Yang, Jian - What is Required in Business Collaboration?, in Volume 92;
- Yang, Jingyi - EMAGEN: An Efficient Approach to Multiple Whole Genome Alignment, in Volume 29;
- Yang, Michael - Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
- Yang, Mingjiang - Wearable Microphone Array as User Interface, in Volume 28;
- Yang, Yun - A Min-Min Average Algorithm for Scheduling Transaction-Intensive Grid Workflows, in Volume 99;
- Agent-based Ontology Integration for Ontology-based Applications, in Volume 58;
- Extended Radar View and Modification Director: Awareness Mechanisms for Synchronous Collaborative Authoring, in Volume 50;
- Incorporating blogs, social bookmarks, and podcasts into unit teaching, in Volume 78;
- Key Research Issues in Grid Workflow Verification and Validation, in Volume 54;
- Supporting Virtual Organisation Alliances with Relative Workflows, in Volume 53;
- SWIM: An Alternative Interface for MSN Messenger, in Volume 64;
- Yao, Andrew - The Development of a Video Metadata Authoring and Browsing System in XML, in Volume 2;
- Yao, Daming - PathwayFinder: Paving the Way Towards Automatic Pathway Extraction, in Volume 29;
- Yau, Wai C. - Vowel recognition of English and German language using Facial movement(SEMG) for Speech control based HCI, in Volume 56;
- Yau, Wai Chee - Voiceless Speech Recognition Using Dynamic Visual Speech Features, in Volume 56;
- Ye, Fan - Contract-Based Justification for COTS Component within Safety Critical Applications, in Volume 47;
- Yearwood, John - A Semantic Approach to Boost Passage Retrieval Effectiveness for Question Answering, in Volume 48;
- An Interactive Knowledge-based Learning Environment for Transferring Health Knowledge, in Volume 68;
- Applying Anatomical Therapeutic Chemical (ATC) and Critical Term Ontologies to Australian Drug Safety Data for Association Rules and Adverse Event Signalling, in Volume 58;
- Classification for accuracy and insight: A weighted sum approach, in Volume 70;
- Using Corpus Analysis to Inform Research into Opinion Detection in Blogs, in Volume 70;
- Yearwood, John L. - A Classification Algorithm that Derives Weighted Sum Scores for Insight into Disease, in Volume 97;
- Opinion Search in Web Logs, in Volume 63;
- Yeh, Chung-Hsing - Discovering Parallel Text from The World Wide Web, in Volume 32;
- Yeh, Ping-Jer - Tracking the Changes of Dynamic Web Pages in the Existence of URL Rewriting, in Volume 61;
- Yen, Hsu-Chun - Mental Map Preserving Graph Drawing Using Simulated Annealing, in Volume 60;
- Yerraballi, Ramesh - A High Performance Kernel-Less Operating System Architecture, in Volume 38;
- SPiKE: Engineering Malware Analysis Tools using Unobtrusive Binary-Instrumentation, in Volume 48;
- Yeung, Lap Kun - Measuring Correlation between Microarray Time-series Data using Dominant Spectrum Component, in Volume 29;
- Yim, Dennis - Systems Assurance for the Integrated Control and Communications System for KCRC East Rail Extensions, in Volume 15;
- Ying, Cheung Man - Incremental Mining for Temporal Association Rules for Crime Pattern Discoveries, in Volume 63;
- Yip, Ben - 3D Reconstruction of a Human Face with Monocular Camera Based on Head Movement, in Volume 36;
- Visualising Internet Traffic Data with Three-Dimensional Spherical Display, in Volume 45;
- Yiu, S.M. - Filtering of Ineffective siRNAs and Improved siRNA Design Tool, in Volume 29;
- Yokoyama, Shohei - An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories, in Volume 39;
- Yong, Xia - Optimal Selection of Image Segmentation Algorithms Based on Performance Prediction, in Volume 36;
- Yoo, Hee Yong - Visualization by information type on mobile device, in Volume 60;
- Yoo, Illhoi - Classification Comparison of Prediction of Solvent Accessibility From Protein Sequences, in Volume 29;
- Cluster Ensemble and Its Applications in Gene Expression Analysis, in Volume 29;
- Yoo, Seungjae - Secure Key Issuing in ID-based Cryptography, in Volume 32;
- Yoshida, Yusuke - Performance Evaluation of Combining Data Migration and Method Migration in Object Database Environments, in Volume 5;
- Yoshikawa, Masatoshi - A Path-based Relational RDF Database, in Volume 39;
- Yost, Nancy - Computers, Kids, and Crayons: A Comparative Study of Emergent Writing Behaviours, in Volume 34;
- Look What Kindergarten Children Can Do with Technologies!, in Volume 34;
- Youcef-Toumi, Kamal - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
- Young, Alison - Facilitating Global Computing Education Through Study Abroad and Collaborative Projects, in Volume 52;
- Multi-Institutional Teaching Communities in Computer Education, in Volume 52;
- Young, Alison L. - Developing and Implementing a Professional Doctorate in Computing, in Volume 30;
- Teaching ICT to Pacific Island Background Students, in Volume 30;
- Young, Stuart - Facilitating Successful Online Computing Courses While Minimising Extra Tutor Workload, in Volume 30;
- Yu, Byung-Hyun - Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory, in Volume 26;
- Yu, Donggang - Quantification of Neural Images using Grey Difference, in Volume 73;
- Yu, Ge - M+-tree : A New Dynamical Multidimensional Index for Metric Spaces, in Volume 17;
- Yu, Jeffrey Xu - Computing Structural Similarity of Source XML Schemas against Domain XML Schema, in Volume 75;
- M+-tree : A New Dynamical Multidimensional Index for Metric Spaces, in Volume 17;
- Path Materialization Revisited: An Efficient Storage Model for XML Data, in Volume 5;
- Semantics based Buffer Reduction for Queries over XML Data Streams, in Volume 75;
- Yu, Larry T.H. - Using Emerging Pattern Based Projected Clustering and Gene Expression Data for Cancer Detection, in Volume 29;
- Yu, Man Hing - Shape Similarity Search Using XML and Portal Technology, in Volume 36;
- Web-based Multimedia GP Medical System, in Volume 36;
- Yu, Shui - Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
- Yu, Xiaomei - A Simulation Study of Using ER Feedback Control to Transport Compressed Video over ATM Networks, in Volume 2;
- A Telemedicine System over Internet, in Volume 2;
- Yu, Zu-Guo - Phylogenetic Tree of Prokaryotes Based on the Complete Genomes using Fractal and Correlation Analyses, in Volume 29;
- Yuan, Bo - Mega Weaver: A Simple Iterative Approach for BAC Consensus Assembly, in Volume 29;
- Yuan, M.L. - A Markerless Registration Method for Augmented Reality based on Affine Properties, in Volume 50;
- Yuan, Shyan-Ming - Tracking the Changes of Dynamic Web Pages in the Existence of URL Rewriting, in Volume 61;
- Yuan, Yidong - Multi-resolution Algorithms for Building Spatial Histograms, in Volume 17;
- Yuan, Zhiguo - Mutation Analysis to Verify Feature Matrices for Isolating Errors in Simulation Models, in Volume 16;
- Yura, Kei - Toward Building Grid Applications in Bioinformatics, in Volume 54;
Top of ListZ - Zachariasen, M. - Some Structural and Geometric Properties of Two-Connected Steiner Networks, in Volume 65;
- Zaheer, Raja Asad - Intelligent Cache Management for Data Grid, in Volume 44;
- Zaiane, Osmar R. - Classifying Text Documents by Associating Terms With Text Categories, in Volume 5;
- Foundations for an Access Control Model for Privacy Preservation in Multi-Relational Association Rule Mining, in Volume 14;
- Privacy Preserving Frequent Itemset Mining, in Volume 14;
- Zakaria, Lailatulqadri - Extracting and Modeling the Semantic Information Content of Web Documents to Support Semantic Document Retrieval, in Volume 96;
- Zarnegar, Armita - Inference of Gene Expression Networks Using Memetic Gene Expression Programming, in Volume 91;
- Zaslavsky, Arkady - A Buddy Model of Security for Mobile Agent Communities Operating in Pervasive Scenarios, in Volume 32;
- Cost-Efficient Mining Techniques for Data Streams, in Volume 32;
- Signature Extraction for Overlap Detection in Documents, in Volume 4;
- Suffix Vector: Space- and Time-Efficient Alternative to Suffix Trees, in Volume 4;
- Zatorsky, Michael - Clustering and Classification of Maintenance Logs using Text Data Mining, in Volume 87;
- Zeephongsekul, Panlop - The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed Workloads, in Volume 91;
- Zeng, Zhanggui - Hidden Line Removal for 2D Cartoon Images, in Volume 11;
- Line Extraction Using Image Carving, in Volume 22;
- Region Matching by Optimal Fuzzy Dissimilarity, in Volume 2;
- Zenmyo, Kouhei - Graph Orientation Algorithms to Minimize the Maximum Outdegree, in Volume 51;
- Zhan, Zhijun - Building Decision Tree Classifier on Private Data, in Volume 14;
- Zhang, Chengqi - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
- The Fish-eye Visualization of Foreign Currency Exchange Data Streams, in Volume 45;
- Zhang, Debbie - Weighted Kernel Model For Text Categorization, in Volume 61;
- Zhang, Dianqing - A Confidence Based Recognition System for TV Commercial Extraction, in Volume 75;
- Zhang, G. - Rule Sets Based Bilevel Decision Model, in Volume 48;
- Zhang, Hao Lan - Newly-discovered Group Awareness Mechanisms for Supporting Real-time Collaborative Authoring, in Volume 40;
- Zhang, Honghai - An Implementation of Interactive Jobs Submission for Grid Computing Portals, in Volume 44;
- Zhang, Jianhua - Visualisation and Comparison of Image Collections based on Self-organised Maps, in Volume 32;
- Zhang, Kang - A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors, in Volume 16;
- Compiled Visual Programs by VisPro, in Volume 36;
- Using Graph Grammer to Implement Global Layout for a Visual Programming Language Generation System, in Volume 11;
- Visual Language Semantics Specification in the VisPro System, in Volume 22;
- Zhang, Ke -Bing - Compiled Visual Programs by VisPro, in Volume 36;
- Zhang, Ke-Bing - Using Graph Grammer to Implement Global Layout for a Visual Programming Language Generation System, in Volume 11;
- Visual Language Semantics Specification in the VisPro System, in Volume 22;
- Zhang, Lei - Weighted Kernel Model For Text Categorization, in Volume 61;
- Zhang, Lin - A Coloured Petri Net based Tool for Course of Action Development and Analysis, in Volume 12;
- Modelling and Initial Analysis of Operational Planning Processes using Coloured Petri Nets, in Volume 12;
- Zhang, Mengjie - Applying Online Gradient-Descent Search to Genetic Programming for Object Recognition, in Volume 32;
- Detecting Stress in Spoken English using Decision Trees and Support Vector Machines, in Volume 32;
- Learning Models for English Speech Recognition, in Volume 26;
- Zhang, Minjie - An Agent-based Peer-to-Peer Grid Computing Architecture - Convergence of Grid and Peer-to-Peer Computing, in Volume 54;
- Zhang, Qing - Clustering Moving Objects for Spatio-temporal Selectivity Estimation, in Volume 27;
- Zhang, Qinzhi - Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges, in Volume 11;
- Zhang, Xiuzhen - Building a Disordered Protein Database: A Case Study in Managing Biological Data, in Volume 63;
- Efficiently Computing the Top N Averages in Iceberg Cubes, in Volume 16;
- Zhang, Xuizhen - Drill Across and Visualization of Cubes with Non-conformed Dimensions, in Volume 75;
- Zhang, Yan - Comparing Industry Benchmarks for J2EE Application Server : IBM's Trade2 vs Sun's ECperf, in Volume 16;
- Zhang, Yanchan - Breast Cancer Survivability via AdaBoost Algorithms, in Volume 80;
- Zhang, Yanchuan - Ticket-Based Service Access Scheme for Mobile Users, in Volume 4;
- Zhang, Yanchun - A Flexible Payment Scheme and its Permission-Role Assignment, in Volume 16;
- A Two-Phase Rule Generation and Optimization Approach for Wrapper Generation, in Volume 49;
- An Integrated Access Control for Securely Querying and Updating XML Data, in Volume 75;
- Anonymous Access Scheme for Electronic Services, in Volume 26;
- Architecture of a Web Accelerator For Wireless Networks, in Volume 62;
- Authorization Algorithms for the Mobility of User-Role Relationship, in Volume 38;
- Constructing Good Quality Web Page Communities, in Volume 5;
- Discovering Task-Oriented Usage Pattern for Web Recommendation, in Volume 49;
- Discovering User Access Pattern Based on Probabilistic Latent Factor Model, in Volume 39;
- Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations, in Volume 17;
- LSDX: A New Labelling Scheme for Dynamically Updating XML Data, in Volume 39;
- On Conceptual Modelling and Design of Role-Based Access Control Systems, in Volume 31;
- Utilizing Hyperlink Transitivity to Improve Web Page Clustering, in Volume 17;
- Web Service Composition Transaction Management, in Volume 27;
- Web Service Composition with Case-Based Reasoning, in Volume 17;
- Web Services Discovery Based On Schema Matching, in Volume 62;
- Zhang, Yitao - Extracting Semantics in a Clinical Scenario, in Volume 68;
- Zhang, Yu - Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
- Zhao Yang Dong - Determining the Fitness of a Document Model by Using Conflict Instances, in Volume 39;
- Zhao, Dejin - Generating mobile device user interfaces for diagram-based modelling tools, in Volume 50;
- Zhao, Jane - Balancing Redundancy and Query Costs in Distributed Data Warehouses, in Volume 43;
- Dynamic Data Warehouse Design as a Refinement in ASM-based Approach, in Volume 67;
- Using Abstract State Machines for Distributed Data Warehouse Design, in Volume 31;
- Zhao, Liping - Symmetry in Class and Type Hierarchy, in Volume 10;
- Zhao, Mansuo - Comparison of Five Conditional Probabilities in 2-Level Image Threshold Based on Bayesian Formulation, in Volume 2;
- Zhao, Weiliang - A Secure Mental Poker Protocol over the Internet, in Volume 21;
- Zhao, Xiaohui - Supporting Virtual Organisation Alliances with Relative Workflows, in Volume 53;
- Zhao, Yanchang - Discovering Debtor Patterns of Centrelink Customers, in Volume 61;
- Zhao, Ying - Searching With Style: Authorship Attribution in Classic Literature, in Volume 62;
- Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
- Zheng, Feifeng - On-demand Bounded Broadcast Scheduling with Tight Deadlines, in Volume 51;
- Zheng, Lanbo - Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters, in Volume 45;
- Zheng, Lei - Improving SAT Using 2SAT, in Volume 4;
- Zheng, Lihong - Edge Detection Based on Modified BP Algorithm of ANN, in Volume 36;
- Zheng, Tan - 3D Reconstruction of Single Picture, in Volume 36;
- Zheng, Z. - Rule Sets Based Bilevel Decision Model, in Volume 48;
- Zhong, David - Color Space Analysis in Color Image Segmentation, in Volume 2;
- Zhou, Aoying - Deriving Relation Keys from XML Keys, in Volume 17;
- Zhou, Guyin - Line Drawing in Virtual Reality using a Game Pad, in Volume 50;
- Zhou, Huan-Xiang - Classification Comparison of Prediction of Solvent Accessibility From Protein Sequences, in Volume 29;
- Zhou, Jun - Multi-Scale Edge Detection with Bilateral Filtering in Spiral Architecture, in Volume 36;
- Zhou, Junmei - Deriving Relation Keys from XML Keys, in Volume 17;
- Zhou, QingQing - A Market-based Rule Learning System, in Volume 32;
- Zhou, Tina T. - Principles of Video Annotation Markup Language (VAML), in Volume 36;
- Zhou, Wanlei - Self-Adaptive Clock Synchronization Based on Clock Precision Difference, in Volume 16;
- Zhou, Xiangmin - A Confidence Based Recognition System for TV Commercial Extraction, in Volume 75;
- Efficient Similarity Search by Summarization in Large Video Database, in Volume 63;
- M+-tree : A New Dynamical Multidimensional Index for Metric Spaces, in Volume 17;
- Zhou, Xiaobo - Linear Predictive Coding and its Decision Logic for Early Prediction of Major Adverse Cardiac Events using Mass Spectrometry Data, in Volume 73;
- Zhou, Xiaofang - Dimensionality Reduction in Patch-Signature Based Protein Structure Matching, in Volume 49;
- Discovering Task-Oriented Usage Pattern for Web Recommendation, in Volume 49;
- Discovering User Access Pattern Based on Probabilistic Latent Factor Model, in Volume 39;
- Efficient Similarity Search by Summarization in Large Video Database, in Volume 63;
- Multiresolution Amalgamation: Dynamic Spatial Data Cube Generation, in Volume 27;
- Selectivity Estimation by Batch-Query based Histogram and Parametric Method, in Volume 63;
- Zhu, Jihan - Successful Studio-based Real-World Projects in IT Education, in Volume 20;
- Zhu, Nianping - Generating Web-based User Interfaces for Diagramming Tools, in Volume 40;
- Zhu, Y. - Sensitivity Analysis of a Superscalar Processor Model, in Volume 6;
- Zhu, Zexuan - Whole-Genome Functional Classification of Genes by Latent Semantic Analysis on Microarray Data, in Volume 29;
- Zic, John - On Modelling Real-Time Mobile Processes, in Volume 4;
- Zimanyi, Esteban - A Conceptual Solution for Representing Time in Data Warehouse Dimensions, in Volume 53;
- Zimmermann, Jacob - Distributed intrusion detection in clusters based on non-interference, in Volume 54;
- Zirintsis, Evangelos - Using Generative Programming to Visualise Hypercode in Complex and Dynamic Systems, in Volume 26;
- Zito, Michele - Large k-Separated Matchings of Random Regular Graphs, in Volume 38;
- Zlatkin, Sergiy - An e-Process Selection Model, in Volume 83;
- Zobel, Justin - An Investigation on a Community's Web Search Variability, in Volume 74;
- Distributed Text Retrieval From Overlapping Collections, in Volume 63;
- Efficient Trie-Based Sorting of Large Sets of Strings, in Volume 16;
- In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval Systems, in Volume 26;
- Music Ranking Techniques Evaluated, in Volume 4;
- Performance of Data Structures for Small Sets of Strings, in Volume 4;
- Questioning Query Expansion: An Examination of Behaviour and Parameters, in Volume 27;
- Searching With Style: Authorship Attribution in Classic Literature, in Volume 62;
- Uni Cheats Racket: A Case Study in Plagiarism Investigation, in Volume 30;
- Video Similarity Detection for Digital Rights Management, in Volume 16;
- What Drives Curriculum Change?, in Volume 30;
- Zou, Joe - Non-Functional Requirements in Business Process Modeling, in Volume 79;
- Zou, Ju Jia - Reduction of Artifacts in Cosine Transform Coded Images, in Volume 11;
- Vectorization of Cartoon Drawings, in Volume 2;
- Zschorn, Andrew - Speech-to-Text Transcription in Support of Pervasive Computing, in Volume 25;
- zur Muehlen, Michael - Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis, in Volume 83;
Top of List
|