Abstract is missing.
- Computing Outside the BoxIan T. Foster. 3
- A Citation Analysis of the ACSC 2006-2008 Proceedings, with Reference to the CORE Conference and Journal RankingsRaymond Lister, Ilona Box. 7-16 [doi]
- Inference of Gene Expression Networks Using Memetic Gene Expression ProgrammingArmita Zarnegar, Peter Vamplew, Andrew Stranieri. 17-23 [doi]
- Evaluating the dynamic behaviour of Python applicationsAlex Holkner, James Harland. 17-25 [doi]
- ALARM: An Adaptive Load-Aware Routing Metric for Hybrid Wireless Mesh NetworksAsad Amir Pirzada, Ryan Wishart, Marius Portmann, Jadwiga Indulska. 25-34 [doi]
- Using Chronological Splitting to Compare Cross- and Single-company Effort Models: Further InvestigationChris Lokan, Emilia Mendes. 35-42 [doi]
- Improving the Transparency of Proxy Injection in JavaHendrik Gani, Caspar Ryan. 43-52 [doi]
- ParaAJ: toward Reusable and Maintainable Aspect Oriented ProgramsKhalid Al-Jasser, Peter Schachte. 53-62 [doi]
- Verification of the SIP Transaction Using Coloured Petri NetsLin Liu. 63-72 [doi]
- HOPPER: a hierarchical planning agent for unpredictable domainsMaciej Wojnar, Peter Andreae. 73-81 [doi]
- The Impact of Quanta on the Performance of Multi-level Time Sharing Policy under Heavy-tailed WorkloadsMalith Jayasinghe, Zahir Tari, Panlop Zeephongsekul. 83-91 [doi]
- Privacy-aware Access Control with Generalization BoundariesMin Li, Hua Wang, Ashley W. Plank. 93-100 [doi]
- Fast and Compact Hash Tables for Integer KeysNikolas Askitis. 101-110 [doi]
- A Domain Specific Language for Execution Profiling and RegulationPeter Nguyen, Katrina E. Falkner, Henry Detmold, David S. Munro. 111-120 [doi]
- Discovering Itemset InteractionsPing Liang, John F. Roddick, Aaron Ceglar, Anna Shillabeer, Denise de Vries. 121-128 [doi]
- A ConceptLink Graph for Text Structure MiningRowena Chau, Ah Chung Tsoi, Markus Hagenbuchner, Vincent Lee. 129-137 [doi]
- Scheduling Parallel Applications on Utility Grids: Time and Cost Trade-off ManagementSaurabh Kumar Garg, Rajkumar Buyya, Howard Jay Siegel. 139-147 [doi]
- Microdata Protection Through Approximate MicroaggregationXiaoxun Sun, Hua Wang, Jiuyong Li. 149-156 [doi]