Abstract is missing.
- Web Mining in Search EnginesRicardo A. Baeza-Yates. 3-4 [doi]
- Access-Ordered IndexesSteven Garcia, Hugh E. Williams, Adam Cannane. 7-14 [doi]
- In-Place versus Re-Build versus Re-Merge: Index Maintenance Strategies for Text Retrieval SystemsNicholas Lester, Justin Zobel, Hugh E. Williams. 15-22 [doi]
- Tuning the Collision Test for PowerWai Wan Tsang, Lucas Chi Kwong Hui, K. P. Chow, C. F. Chong, Sam C. W. Tso. 23-30 [doi]
- Closed Form Expressions for the State Space of TCP s Data Transfer Service Operating over Unbounded ChannelsJonathan Billington, Bing Han. 31-39 [doi]
- Kerberos Assisted Authentication in Mobile Ad-hoc NetworksAsad Amir Pirzada, Chris McDonald. 41-46 [doi]
- Establishing Trust In Pure Ad-hoc NetworksAsad Amir Pirzada, Chris McDonald. 47-54 [doi]
- Reducing Register Pressure Through LAER AlgorithmGao Song. 55-64 [doi]
- Verification of the Futurebus+ Cache Coherence protocol: A case study in model checkingKylie Williams, Robert Esser. 65-71 [doi]
- Towards the Completion of the Formal Semantics of OCL 2.0Stephan Flake. 73-82 [doi]
- Formalization of UML Statechart Models Using Concurrent Regular ExpressionsS. Jansamak, A. Surarerks. 83-88 [doi]
- Automatic Derivation of Loop Termination Conditions to Support VerificationDaniel Powell. 89-97 [doi]
- Garbage Collection for Storage-Oriented ClustersWilliam Brodie-Tyrrell, Henry Detmold, Katrina E. Falkner, David S. Munro. 99-108 [doi]
- On Improving the Memory Access Patterns During The Execution of Strassen s Matrix Multiplication AlgorithmHossam A. ElGindy, George Ferizis. 109-115 [doi]
- Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared MemoryByung-Hyun Yu, Zhiyi Huang, Stephen Cranefield, Martin K. Purvis. 117-123 [doi]
- Lossless Image Compression Using Pixel ReorderingMichael Ciavarella, Alistair Moffat. 125-132 [doi]
- Improving Resource Utilization for MPEG-4 Decoding in Embedded End-DevicesMichael Ditze, Peter Altenbernd, Chris Loeser. 133-142 [doi]
- Improved Video Mosaic Construction by Selecting a Suitable Subset of Video ImagesJ. S. Jimmy Li, Sharmil Randhawa. 143-149 [doi]
- The Effectiveness of Innovative Approaches to CS1: Comparing Opinion to OutcomeJames D. Allert. 151-157 [doi]
- Detecting Privacy and Ethical Sensitivity in Data Mining ResultsPeter Fule, John F. Roddick. 159-166 [doi]
- Self-Replicating Expressions in the Lambda CalculusJames Larkin, Phil Stocks. 167-173 [doi]
- Towards a Semantic Basis for RosettaCatherine Menon, Charles Lakos. 175-184 [doi]
- An Approach to Specifying Software FrameworksLeesa Murray, David A. Carrington, Paul A. Strooper. 185-192 [doi]
- A Framework for Modelling and Analysing Mobile SystemsGraeme Smith. 193-202 [doi]
- Java Implementation Verification Using Reverse EngineeringDavid J. A. Cooper, Benjamin Khoo, Brian R. von Konsky, Mike Robey. 203-211 [doi]
- Strength Reduction for Loop-Invariant TypesPhung Hua Nguyen, Jingling Xue. 213-222 [doi]
- Exploiting FPGA Concurrency to Enhance JVM PerformanceJames Parnis, Gareth Lee. 223-232 [doi]
- Code Improvements for Model Elimination Based Reasoning SystemsRichard A. Hagen, Scott D. Goodwin, Abdul Sattar. 233-240 [doi]
- On Evolving Fixed Pattern Strategies for Iterated Prisoner s DilemmaDaniel Jang, Peter A. Whigham, Grant Dick. 241-247 [doi]
- A RMI Protocol for AgletsFeng Lu, Kris Bubendorfer. 249-253 [doi]
- Adaptive Cooperative Fuzzy Logic ControllerJustin Ammerlaan, David Wright. 255-263 [doi]
- Forward Chaining for Robot and Agent Navigation using Potential FieldsGraeme Bell, Michael Weir. 265-274 [doi]
- Frequency Space Representation of Transitions of Quadruped Robot GaitsJan Hoffmann, Uwe Düffert. 275-278 [doi]
- Securing Distributed Computing Against the Hostile HostJohn H. Hine, Paul Dagger. 279-286 [doi]
- Visually Sealed and Digitally Signed DocumentsVicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell. 287-294 [doi]
- Anonymous Access Scheme for Electronic ServicesHua Wang, Lili Sun, Yanchun Zhang, Jinli Cao. 295-304 [doi]
- Sensor Fusion Weighting Measures in Audio-Visual Speech RecognitionTrent W. Lewis, David M. W. Powers. 305-314 [doi]
- Automatic Music Classification ProblemsGeorge Mitri, Alexandra L. Uitdenbogerd, Victor Ciesielski. 315-322 [doi]
- Learning Models for English Speech RecognitionHuayang Xie, Peter Andreae, Mengjie Zhang, Paul Warren. 323-329 [doi]
- An Evaluation of Web Services in the Design of a B2B ApplicationK. Hogg, P. Chilcott, M. Nolan, B. Srinivasan. 331-340 [doi]
- Using Self-Defending Objects to Develop Security Aware Applications in JavaJohn W. Holford, William J. Caelli, Anthony W. Rhodes. 341-349 [doi]
- An Open Meteorological Alerting System: Issues and SolutionsIan D. Mathieson, Sandy Dance, Lin Padgham, Malcolm Gorman. 351-358 [doi]
- Network Robustness and Graph TopologyAnthony H. Dekker, Bernard D. Colbert. 359-368 [doi]
- Flexible Layering in Hierarchical Drawings with Nodes of Arbitrary SizeCarsten Friedrich, Falk Schreiber. 369-376 [doi]
- Using Generative Programming to Visualise Hypercode in Complex and Dynamic SystemsKath Mickan, Ronald Morrison, Graham N. C. Kirby. 377-386 [doi]