Abstract is missing.
- Biomedical computing and visualizationChris R. Johnson, David M. Weinstein. 3-10 [doi]
- Logic and refinement for chartsGreg Reeve, Steve Reeves. 13-23 [doi]
- Supporting software reuse by the individual programmerMin-Sheng Hsieh, Ewan D. Tempero. 25-33 [doi]
- Identifying refactoring opportunities by identifying dependency cyclesHayden Melton, Ewan D. Tempero. 35-41 [doi]
- Unsupervised band removal leading to improved classification accuracy of hyperspectral imagesR. Ian Faulconbridge, Mark R. Pickering, Michael J. Ryan. 43-48 [doi]
- On compensating the Mel-frequency cepstral coefficients for noisy speech recognitionEric H. C. Choi. 49-54 [doi]
- Segregated failures model for availability evaluation of fault-tolerant systemsSergiy A. Vilkomir, David Lorge Parnas, Veena B. Mendiratta, Eamonn Murphy. 55-61 [doi]
- On pedagogically sound examples in public-key cryptographySuan Khai Chong, Graham Farr, Laura Frost, Simon Hawley. 63-68 [doi]
- Towards security labellingChuchang Liu, Mehmet A. Orgun. 69-76 [doi]
- Improvements of TLAESA nearest neighbour search algorithm and extension to approximation searchKen Tokoro, Kazuaki Yamaguchi, Sumio Masuda. 77-83 [doi]
- Trust network analysis with subjective logicAudun Jøsang, Ross Hayward, Simon Pope. 85-94 [doi]
- A semantic approach to boost passage retrieval effectiveness for question answeringBahadorreza Ofoghi, John Yearwood, Ranadhir Ghosh. 95-101 [doi]
- A programming paradigm for machine learning, with a case study of Bayesian networksLloyd Allison. 103-111 [doi]
- Rule sets based bilevel decision modelZ. Zheng, G. Zhang, Q. He, J. Lu, Z. Shi. 113-120 [doi]
- CASO: a framework for dealing with objectives in a constraint-based extension to AgentSpeak(L)Aniruddha Dasgupta, Aditya K. Ghose. 121-126 [doi]
- Modelling layer 2 and layer 3 device bandwidths using B-node theoryS. Cikara, Stanislaw P. Maj, David T. Shaw. 127-136 [doi]
- Throughput fairness in k-ary n-cube networksCruz Izu. 137-145 [doi]
- A JMX toolkit for merging network management systemsFeng Lu, Kris Bubendorfer. 147-156 [doi]
- A framework for visual data mining of structuresHans-Jörg Schulz, Thomas Nocke, Heidrun Schumann. 157-166 [doi]
- Shallow NLP techniques for internet searchAlex Penev, Raymond K. Wong. 167-176 [doi]
- Approximative filtering of XML documents in a publish/subscribe systemAnnika Hinze, Yann Michel, Torsten Schlieder. 177-185 [doi]
- Manufacturing opaque predicates in distributed systems for code obfuscationAnirban Majumdar, Clark D. Thomborson. 187-196 [doi]
- Pruning subscriptions in distributed publish/subscribe systemsSven Bittner, Annika Hinze. 197-206 [doi]
- The challenge of creating cooperating mobile services: experiences and lessons learnedAnnika Hinze, George Buchanan. 207-215 [doi]
- Human visual perception of region warping distortionsYang-Wai Chow, Ronald Pose, Matthew Regan, James Phillips. 217-226 [doi]
- Rendering multi-perspective images with trilinear projectionScott Vallance, Paul R. Calder. 227-235 [doi]
- Extensible detection and indexing of highlight events in broadcasted sports videoDian Tjondronegoro, Yi-Ping Phoebe Chen, Binh Pham. 237-246 [doi]
- Using formal concept analysis with an incremental knowledge acquisition system for web document managementTimothy J. Everts, Sung Sik Park, Byeong Ho Kang. 247-256 [doi]
- Interaction design for a mobile context-aware system using discrete event modellingAnnika Hinze, Petra Malik, Robi Malik. 257-266 [doi]
- Constructing real-time collaborative software engineering tools using CAISE, an architecture for supporting tool developmentCarl Cook, Neville Churcher. 267-276 [doi]
- Plagiarism detection across programming languagesChristian Arwin, Seyed M. M. Tahaghoghi. 277-286 [doi]
- Programming with heterogeneous structures: manipulating XML data using bondiF. Y. Huang, C. B. Jay, David B. Skillicorn. 287-295 [doi]
- A relational account of objectsClara Murdaca, C. Barry Jay. 297-302 [doi]
- Tracing secure information flow through mode changesColin J. Fidge, Tim McComb. 303-310 [doi]
- SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentationAmit Vasudevan, Ramesh Yerraballi. 311-320 [doi]
- A framework for role-based group deligation in distributed environmentsHua Wang, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson. 321-328 [doi]