This paper describes the use of the reflective journal in a computer programming course at the University of South Australia. We describe rationale for the journal relating it to ...
The majority of the world’s computing resources remains idle most of the time. By using this resource pool, an individual computation may be completed in a fraction of time requ...
Easy access to the Web has led to increased potential for students cheating on assignments by plagiarising others’ work. By the same token, Web-based tools offer the potential f...
Raphael A. Finkel, Arkady B. Zaslavsky, Kriszti&aa...
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Research systems based on capabilit...
This paper discusses work underway to develop a framework for the use of hierarchical federation communities as a tool for distributed simulation. The Virtual Ship Project is the ...
The Block Sorting process of Burrows and Wheeler can be applied to any sequence in which symbols are (or might be) conditioned upon each other. In particular, it is possible to pa...
R. Yugo Kartono Isal, Alistair Moffat, A. C. H. Ng...
This paper examines QoS guarantees for bandwidth in mobile wireless networks, with a focus on reducing dropped connections on handoff. We can achieve this by reserving bandwidth f...
We show how frequently occurring sequential patterns may be found from large datasets by first inducing a finite state automaton model describing the data, and then querying the m...