Items where Subject is "Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTATION THEORY AND MATHEMATICS (080200) > Analysis of Algorithms and Complexity (080201)"
|Up a level|
- Subjects classification (47668)
- Australian and New Zealand Standard Research Classification (47668)
Group by: Authors/Creators | Item Type
Number of items at this level: 25.
Mathews, Sarah & Timms, Peter (2006) In Silico Identification of Chlamydial Promoters and Their Role in Regulation of Development. In Bavoil, P & Wyrick, P (Eds.) Chlamydia: Genomics and Pathogenesis. Horizon Bioscience, United Kingdom, England, Norfolk, pp. 133-156.
Costello, Craig & Lauter, Kristin (2012) Group law computations on Jacobians of hyperelliptic Curves. Lecture Notes in Computer Science, 7118, pp. 92-117.
De Vries, Christopher M. & Geva, Shlomo (2009) Document clustering with K-tree. Lecture Notes in Computer Science, 5631/2, pp. 420-431.
Fung, Y.F., Ercan, M.F., & Ho, T.K. (2002) A parallel solution to linear systems. Microprocessors and Microsystems, 26(1), pp. 39-44.
South, Leah & Stebila, Douglas (2013) Count-min sketches for estimating password frequency within Hamming distance two. Lecture Notes in Computer Science [Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013 Proceedings], 7959, pp. 388-402.
Warne, David J., Hayward, Ross F., Kelson, Neil A., & Mallet, Dann G. (2013) An efficient algorithm for the detection of Eden. Complex Systems, 22(4), pp. 377-404.
Xu, Yue, Li, Yuefeng, & Shaw, Gavin (2008) A Reliable Basis for Approximate Association Rules. IEEE Intelligent Informatics Bulletin, 9(1), pp. 25-31.
Alhamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2013) Slid pairs in the initialisation of the A5/1 stream cipher. In Thomborson, Clark & Parampalli, Udaya (Eds.) Proceedings of the 11th Australasian Information Security Conference (AISC 2013), Australian Computer Society Inc., Adelaide, SA, pp. 3-12.
Alhamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2012) Slide attacks on the Sfinks stream cipher. In Proceedings of the 6th International Conference on Signal Processing and Communication Systems, IEEE, Radisson Resort, Gold Coast, Qld.
Brelage, Christian, Recker, Jan C., & Mueller-Wienbergen, Felix (2006) Navigational Design of Web Information Systems – Framework Development and Case Study. In Ljungberg, Jan & Andersson, Magnus (Eds.) 14th European Conference on Information Systems, June 12-14, 2006, Goeteborg, Sweden.
Campbell, Alexander B., Berglund, Erik, & Streit, Alexander (2005) Graphics Hardware Implementation of the Parameter-Less Self Organising Map. In Gallagher, Marcus, Hogan, James, & Maire, Frederic (Eds.) Intelligent Data Engineering and Automated Learning - IDEAL 2005: 6th International Conference, 6-8 July 2005, Australia, Queensland, Brisbane.
Cliff, Yvonne, Boyd, Colin, & Gonzalez Nieto, Juan M. (2009) How to extract and expand randomness : a summary and explanation of existing results. In Applied Cryptography and Network Security, 2-5 June 2009, Place de l'Etoile , Paris.
De Vries, Christopher M., De Vine, Lance, & Geva, Shlomo (2009) Random Indexing K-tree. In Kay, Judy, Thomas, Paul, & Trotman, Andrew (Eds.) ADCS 2009 : Proceedings of the Fourteenth Australasian Document Computing Symposium, School of Information Technologies, University of Sydney, University of New South Wales, Sydney.
De Vries, Christopher Michael & Geva, Shlomo (2009) K-tree : large scale document clustering. In 32nd international ACM SIGIR Conference on Research and Development in Information Retrieval, 19-23 July 2009, Boston, MA.
Ekanayake, Chathura C., Dumas, Marlon, Garcia-Banuelos, Luciano, La Rosa, Marcello, & ter Hofstede, Arthur H.M. (2012) Approximate clone detection in repositories of business process models. In Business Process Management, Lecture Notes in Computer Science, Springer Berlin Heidelberg, Tallinn, Estonia, pp. 302-318.
Feng, Yanming & Tang, Maolin (2008) Area-oriented reference station placement for network RTK. In Zhou, H & Shen, P (Eds.) Proceedings of the International Conference on Computer Science and Software Engineering - CSSE 2008, 12 - 14 December 2008, China, Hubei, Wuhan.
Li, Zhixu, Sitbon, Laurianne, & Zhou, Xiaofang (2011) PartSS : An efficient partition-based filtering for edit distance constraints. In Shen, Heng Tao & Zhang, Yanchun (Eds.) Australasian Database Conference (ADC 2011), ACS, Perth, Australia , 103-112 .
McKinnon, David N., Lakemond, Ruan, Fookes, Clinton B., & Sridharan, Sridha (2008) Ground-Plane Based Projective Reconstruction for Surveillance Camera Networks. In International Conference on Signal Processing and Communication Systems 2007, 17-19 December 2007, Gold Coast, Australia.
Salam, Md Iftekhar, Wong, Kenneth Koon-Ho, Bartlett, Harry, Simpson, Leonie, Dawson, Ed, & Pieprzyk, Josef (2016) Finding state collisions in the authenticated encryption stream cipher ACORN. In ACSW '16 Australasian Computer Science Week, 2 - 5 February 2016, Canberra, A.C.T.
Shen, Shujun & Liu, Fawang (2005) Error analysis of an explicit finite difference approximation for the space fractional diffusion equation with insulated ends. In May, R. (Ed.) Proceedings of the 2004 International Conference on Computational Techniques and Applicaitons, Australian Mathematical Society, Melbourne, Victoria, pp. 872-887.
Tang, Maolin (2008) A new greedy algorithm for VLSI floorplan optimization. In Zhou, H & Shen, P (Eds.) Proceedings of the International Conference on Computer Science and Software Engineering - CSSE 2008, 12 - 14 December 2008, China, Hubei, Wuhan.
Tang, Maolin & Berntsson, L. Johan (2004) A slicing structure representation for the multi-layer floorplan layout problem. In Lecture Notes in Computer Science, Springer, Coimbra, Portugal, pp. 188-197.
Xu, Yue, Gao, Yang, Li, Yuefeng, & Liu, Bin (2013) A two-stage approach for generating topic models. In Pei, Jian, Tseng, Vincent S., Cao, Longbing, Motoda, Hiroshi, & Xu, Guandong (Eds.) Lecture Notes in Computer Science : Advances in Knowledge Discovery and Data Mining, Springer Berlin Heidelberg, Gold Coast Convention and Exhibition Centre, Gold Coast, QLD, pp. 221-232.
Jin, Tao, Wang, Jianmin, La Rosa, Marcello, ter Hofstede, Arthur H.M., & Wen, Lijie (2010) Efficient querying of large process model repositories. (Submitted (not yet accepted for publication))
Warne, David (2013) On the effect of topology on cellular automata rule spaces. (Unpublished)