Sciweavers

ACSC
2005
IEEE
14 years 5 months ago
The Effect of Context and Application Type on Mobile Usability: An Empirical Study
This paper discusses the effect of context on mobile usability, proposes an expanded model of mobile application context, and conducts an empirical study to test a number of hypot...
Caspar Ryan, Atish Gonsalves
ACSC
2005
IEEE
14 years 5 months ago
Dependable Dynamic Source Routing without a Trusted Third Party
Ad-hoc networks are frequently used to establish communication in improvised environments without requiring any fixed infrastructure. These networks are formed with the help of t...
Asad Amir Pirzada, Chris McDonald, Amitava Datta
ACSC
2005
IEEE
14 years 5 months ago
Interprocedural Side-Effect Analysis and Optimisation in the Presence of Dynamic Class Loading
We introduce a new approach to computing interprocedural modification side effects for Java programs in the presence of dynamic class loading. When compile-time unknown classes c...
Phung Hua Nguyen, Jingling Xue
ACSC
2005
IEEE
14 years 5 months ago
The Electronic Primaries: Predicting the U.S. Presidency Using Feature Selection with Safe Data Reduction
The data mining inspired problem of finding the critical, and most useful features to be used to classify a data set, and construct rules to predict the class of future examples ...
Pablo Moscato, Luke Mathieson, Alexandre Mendes, R...
ACSC
2005
IEEE
14 years 5 months ago
A Delivery Framework for Health Data Mining and Analytics
The iHealth Explorer tool, developed by CSIRO and DoHA, delivers web services type data mining and analytic facilities over a web interface, providing desktop access to sophistica...
Damien McAullay, Graham J. Williams, Jie Chen, Hui...
ACSC
2005
IEEE
14 years 5 months ago
Integration of generic program analysis tools into a software development environment
Support for program understanding in development and maintenance tasks can be facilitated by program analysis techniques. Both control-flow and data-flow analysis can support pr...
Erica Glynn, Ian J. Hayes, Anthony MacDonald
ACSC
2005
IEEE
14 years 5 months ago
A Two-Pronged Attack on the Dragon of Intractability
One approach to tractably finding a solution to an NP-complete optimisation problem is heuristic, where the solution is inexact but quickly found; another approach is to reduce t...
Stephen Gilmour, Mark Dras
ACSC
2005
IEEE
14 years 5 months ago
Layout of Bayesian Networks
Kim Marriott, Peter Moulder, Lucas R. Hope, Charle...
ACSC
2005
IEEE
14 years 5 months ago
A Pedagogical Evaluation of New State Model Diagrams for Teaching Internetwork Technologies
Curriculum based on internetworking devices is primarily based on the Command Line Interface (CLI) and case studies. However a single CLI command may produce output that is not on...
Stanislaw P. Maj, G. Kohli, T. Fetherston
ACSC
2005
IEEE
14 years 5 months ago
Graph Grammar Encoding and Evolution of Automata Networks
The global dynamics of automata networks (such as neural networks) are a function of their topology and the choice of automata used. Evolutionary methods can be applied to the opt...
Martin H. Luerssen