Abstract is missing.
- Gradiance On-Line Accelerated LearningJeffrey D. Ullman. 3-6 [doi]
- Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class LoadingPhung Hua Nguyen, Jingling Xue. 9-18 [doi]
- Large Object Segmentation with Region Priority RenderingYang-Wai Chow, Ronald Pose, Matthew Regan. 19-28 [doi]
- A Novel Fuzzy Logic Controller (FLC) for Shortening the TCP Channel Roundtrip Time by Eliminating User Buffer Overflow AdaptivelyWilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon. 29-38 [doi]
- A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile EnvironmentsChung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu. 39-48 [doi]
- SuperstringRep: Reputation-enhanced Service DiscoveryRyan Wishart, Ricky Robinson, Jadwiga Indulska. 49-58 [doi]
- Simulating Network Robustness for Critical Infrastructure NetworksAnthony H. Dekker. 59-68 [doi]
- Authorization Algorithms for the Mobility of User-Role RelationshipHua Wang, Lili Sun, Yanchun Zhang, Jinli Cao. 69-78 [doi]
- Dependable Dynamic Source Routing without a Trusted Third PartyAsad Amir Pirzada, Chris McDonald, Amitava Datta. 79-86 [doi]
- A Framework of Filtering, Clustering and Dynamic Layout Graphs for VisualizationXiaodi Huang, Peter Eades, Wei Lai. 87-96 [doi]
- Layout of Bayesian NetworksKim Marriott, Peter Moulder, Lucas R. Hope, Charles Twardy. 97-106 [doi]
- Cloth Animation with Adaptively Refined MeshesLing Li, Vasily Volkov. 107-114 [doi]
- The Effect of Context and Application Type on Mobile Usability: An Empirical StudyCaspar Ryan, Atish Gonsalves. 115-124 [doi]
- Real-time Monocular Tracking of View Frustum for Large Screen Human-Computer InteractionKelvin Cheng, Masahiro Takatsuka. 125-134 [doi]
- A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork TechnologiesStanislaw P. Maj, G. Kohli, T. Fetherston. 135-142 [doi]
- A Programming Language for Web Service DevelopmentDominic Cooney, Marlon Dumas, Paul Roe. 143-150 [doi]
- Towards a Fully-reflective Meta-programming LanguageGregory Neverov, Paul Roe. 151-158 [doi]
- Agent-Based Distributed Software VerificationChris Hunter, Peter Robinson, Paul A. Strooper. 159-164 [doi]
- A Contraction Algorithm for finding Minimal Feedback SetsHenning Köhler. 165-174 [doi]
- Large k-Separated Matchings of Random Regular GraphsMihalis Beis, William Duckworth, Michele Zito. 175-182 [doi]
- A Two-Pronged Attack on the Dragon of IntractabilityStephen Gilmour, Mark Dras. 183-192 [doi]
- Video Cut Detection using Frame WindowsSeyed M. M. Tahaghoghi, Hugh E. Williams, James A. Thom, Timo Volkmer. 193-200 [doi]
- Fractal Image Compression on a Pseudo Spiral ArchitectureHuaqing Wang, Meiqing Wang, Tom Hintz, Xiangjian He, Qiang Wu. 201-208 [doi]
- A Statistical-driven Approach for Automatic Classification of Events in AFL Video HighlightsDian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham. 209-218 [doi]
- Approximate Recognition of Non-regular Languages by Finite AutomataGerry Eisman, Bala Ravikumar. 219-228 [doi]
- Graph Grammar Encoding and Evolution of Automata NetworksMartin H. Luerssen. 229-238 [doi]
- Optimising Parallel Pattern-matching by Source-level Program TransformationR. Lyndon While, Tony Field. 239-248 [doi]
- Integration of generic program analysis tools into a software development environmentErica Glynn, Ian J. Hayes, Anthony MacDonald. 249-258 [doi]
- A Formal Approach to Component Adaptation and CompositionDavid Hemer. 259-266 [doi]
- Modelling and Measuring Collaborative Software EngineeringCarl Cook, Neville Churcher. 267-276 [doi]
- Flexible Exclusion Control for Composite ObjectsAbdelsalam Shanneb, John Potter. 277-286 [doi]
- A High Performance Kernel-Less Operating System ArchitectureAmit Vasudevan, Ramesh Yerraballi, Ashish Chawla. 287-296 [doi]
- Auction Based Resource Negotiation in NOMADKris Bubendorfer, John H. Hine. 297-306 [doi]
- Stemming IndonesianJelita Asian, Hugh E. Williams, Seyed M. M. Tahaghoghi. 307-314 [doi]
- Measuring Semantic Similarity in the Taxonomy of WordNetDongqiang Yang, David M. W. Powers. 315-322 [doi]
- Combining Logics for Modelling Security PoliciesChuchang Liu, Patrick McLean, Maris A. Ozols. 323-332 [doi]
- Unsupervised Anomaly Detection in Network Intrusion Detection Using ClustersKingsly Leung, Christopher Leckie. 333-342 [doi]
- The Geodesic Self-Organizing Map and Its Error AnalysisYingxin Wu, Masahiro Takatsuka. 343-352 [doi]
- A Simulation Framework for Knowledge Acquisition EvaluationTri M. Cao, Paul Compton. 353-360 [doi]
- Integer Programming Models and Algorithms for Molecular Classification of Cancer from Microarray DataRegina Berretta, Alexandre Mendes, Pablo Moscato. 361-370 [doi]
- The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data ReductionPablo Moscato, Luke Mathieson, Alexandre Mendes, Regina Berretta. 371-380 [doi]
- A Delivery Framework for Health Data Mining and AnalyticsDamien McAullay, Graham J. Williams, Jie Chen, Huidong Jin. 381-390 [doi]