Abstract is missing.
- Just Like Magic: Anthropological Musings on the History and Culture of Wireless TechnologiesGenevieve Bell. 3 [doi]
- Compact Layout of Layered TreesKim Marriott, Peter Sbarski. 7-14 [doi]
- Improved Shortest Path Algorithms For Nearly Acyclic Directed GraphsLin Tian, Tadao Takaoka. 15-24 [doi]
- From Graphs to Euclidean Virtual Worlds: Visualization of 3D Electronic InstitutionsSara Drago, Anton Bogdanovych, Massimo Ancona, Simeon J. Simoff, Carles Sierra. 25-33 [doi]
- QUIP: A Protocol For Securing Content in Peer-To-Peer Publish/Subscribe Overlay NetworksAmy Beth Corman, Peter Schachte, Vanessa Teague. 35-40 [doi]
- Enhancing Data Locality in a Fully Decentralised P2P Cycle Stealing FrameworkRichard Mason, Wayne Kelly. 41-47 [doi]
- Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing ProtocolAsad Amir Pirzada, Marius Portmann, Jadwiga Indulska. 49-58 [doi]
- Searching With Style: Authorship Attribution in Classic LiteratureYing Zhao, Justin Zobel. 59-68 [doi]
- On Inferences of Full Hierarchical DependenciesSven Hartmann, Sebastian Link. 69-78 [doi]
- Domination Normal Form - Decomposing Relational Database SchemasHenning Köhler. 79-85 [doi]
- Jooj: Real-Time Support For Avoiding Cyclic DependenciesHayden Melton, Ewan D. Tempero. 87-95 [doi]
- HAT-Trie: A Cache-Conscious Trie-Based Data Structure For StringsNikolas Askitis, Ranjan Sinha. 97-105 [doi]
- Web Services Discovery Based On Schema MatchingYanan Hao, Yanchun Zhang. 107-113 [doi]
- Conflict Management For Real-Time Collaborative Editing in Mobile Replicated ArchitecturesSandy Citro, Jim McGovern, Caspar Ryan. 115-124 [doi]
- Architecture of a Web Accelerator For Wireless NetworksJian Song, Yanchun Zhang. 125-129 [doi]
- Periodical Payment Model Using Restricted Proxy CertificatesGrigori Goldman. 131-139 [doi]
- Mutually Visible Agents in a Discrete Environment141-150 [doi]
- Exploring Human Judgement of Digital ImageryTimo Volkmer, James A. Thom, Seyed M. M. Tahaghoghi. 151-160 [doi]
- Segmentation and Border Identification of Cells in Images of Peripheral Blood Smear SlidesNicola Ritter, James R. Cooper. 161-169 [doi]
- Cross-Layer Verification of Type Flaw Attacks on Security ProtocolsBenjamin W. Long, Colin J. Fidge, David A. Carrington. 171-180 [doi]
- Access Control Models and Security LabellingChuchang Liu, Angela Billard, Maris A. Ozols, Nikifor Jeremic. 181-190 [doi]
- Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri NetsSuratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto. 191-200 [doi]
- The CRSS Metric for Package Design QualityHayden Melton, Ewan D. Tempero. 201-210 [doi]
- Dynamic Measurement of PolymorphismKelvin Choi, Ewan D. Tempero. 211-220 [doi]
- Efficient Cycle-Accurate Simulation of the Ultrasparc III CPUPeter E. Strazdins, Bill Clarke, Andrew Over. 221-228 [doi]