Sciweavers

ACSC
2002
IEEE
14 years 19 days ago
Learning and the Reflective Journal in Computer Science
This paper describes the use of the reflective journal in a computer programming course at the University of South Australia. We describe rationale for the journal relating it to ...
S. E. George
ACSC
2002
IEEE
14 years 19 days ago
AdJava - Automatic Distribution of Java Applications
The majority of the world’s computing resources remains idle most of the time. By using this resource pool, an individual computation may be completed in a fraction of time requ...
Mohammad M. Fuad, Michael J. Oudshoorn
ACSC
2002
IEEE
14 years 19 days ago
Signature Extraction for Overlap Detection in Documents
Easy access to the Web has led to increased potential for students cheating on assignments by plagiarising others’ work. By the same token, Web-based tools offer the potential f...
Raphael A. Finkel, Arkady B. Zaslavsky, Kriszti&aa...
ACSC
2002
IEEE
14 years 19 days ago
Bracket Capabilities for Distributed Systems Security
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
Mark Evered
ACSC
2002
IEEE
14 years 19 days ago
Employing Hierarchical Federation Communities in the Virtual Ship Architecture
This paper discusses work underway to develop a framework for the use of hierarchical federation communities as a tool for distributed simulation. The Virtual Ship Project is the ...
A. Cramp, Michael J. Oudshoorn
ACSC
2002
IEEE
14 years 19 days ago
Enhanced Word-Based Block-Sorting Text Compression
The Block Sorting process of Burrows and Wheeler can be applied to any sequence in which symbols are (or might be) conditioned upon each other. In particular, it is possible to pa...
R. Yugo Kartono Isal, Alistair Moffat, A. C. H. Ng...
ACSC
2002
IEEE
14 years 19 days ago
Bandwidth Reservation Strategies for Mobility Support of Wireless Connections with QoS Guarantees
This paper examines QoS guarantees for bandwidth in mobile wireless networks, with a focus on reducing dropped connections on handoff. We can achieve this by reserving bandwidth f...
R. Hutchens, S. Singh
ACSC
2002
IEEE
14 years 19 days ago
Using Finite State Automata for Sequence Mining
We show how frequently occurring sequential patterns may be found from large datasets by first inducing a finite state automaton model describing the data, and then querying the m...
Philip Hingston