View the document View the PDF document 3-4 Heap Workspace Operations (by Bethlehem, Tobias)
View the document View the PDF document A Comparison of XML and Relational Database Technology (by Lutteroth, Christof)
View the document View the PDF document A Constraint-Based Intelligent Tutoring System for the Java Programming Language (by Holland, Jay and Mitrovic, Antonija)
View the document View the PDF document A Discriminative Approach to Structured Biological Data (by Mutter, Stefan and Pfahringer, Bernhard)
View the document View the PDF document A Framework for Supporting the Application of Qualitative Reasoning (by Schultz, Carl)
View the document View the PDF document Accelerate process of tracing back DoS/DDoS attack (by Izaddoost, Alireza)
View the document View the PDF document Accent Modification: Approaches and Issues (by Teutenberg, Jonathan)
View the document View the PDF document Ad Hoc Visual Documentation (by Freeman, Isaac Jonathan)
View the document View the PDF document An Improved Encryption Key Management System for IEEE 802.16 Mesh Mode Security Using Simulation (by Nisbet, Alastair)
View the document View the PDF document Augmented Memory for Conference Attendees (by Schweer, Andrea and Hinze, Annika)
View the document View the PDF document Brain Gene Ontology: Tool to Facilitate Education and Research in Neuroinformatics Area (by Jain, Vishal and Kasabov, Nikola and Gottgtroy, Paulo C. M. and Benuskova, Lubica and Joseph, Frances)
View the document View the PDF document Building in Web application security at the requirements stage: A tool for visualizing and evaluating security trade-offs (by Nehring, Natalia)
View the document View the PDF document Collaborative Profiles for Event Notification in Healthcare: Lessons Learned from Healthcare Staff Interviews (by Jung, Doris)
View the document View the PDF document Computational Model of Plan Competition in the Prefrontal Cortex (by Caza, Gregory A.)
View the document View the PDF document Computing Semantic Relatedness using Wikipedia Link Structure (by Milne, David)
View the document View the PDF document Congestion Control for Data-limited Flows (by Hasan, Syed Faisal)
View the document View the PDF document Designing Ethical Investigation on Password and Online Account Management Strategies (by Notoatmodjo, Gilbert)
View the document View the PDF document Exploring Better Techniques for Diagram Recognition (by Patel, Rachel and Plimmer, Beryl and Grundy, John and Ihaka, Ross)
View the document View the PDF document Extracting Use Case Specifications for Sequence and Class Diagrams Generation (by Giganto, Reynaldo T.)
View the document View the PDF document Fitting spatial ability and free-formed questions into Intelligent Tutoring Systems development (by Milik, Nancy and Mitrovic, Antonija and Grimley, Michael)
View the document View the PDF document Formal Methods and Refinement for User-Centred Design Artefacts (by Bowen, Judy and Reeves, Steve)
View the document View the PDF document HoneyC - The Low-Interaction Client Honeypot (by Seifert, Christian and Welch, Ian and Komisarczuk, Peter)
View the document View the PDF document Improving the Stability of Transmission in Mobile Ad Hoc Networks (by Zhang, Yifan and Komisarczuk, Peter)
View the document View the PDF document Increasing the Expressiveness of Subscriptions and Advertisements in Distributed Content-Based Publish/Subscribe Systems (by Bittner, Sven)
View the document View the PDF document Integrative Architecture for Concurrent Artificial Intelligence in Robotic Systems (by Kloss, Guy K. and Reyes, Napoleon and Hawick, Ken)
View the document View the PDF document Intelligent Tutoring Systems Respecting Human Nature (by Zakharov, Kon and Mitrovic, Antonija and Johnston, Lucy)
View the document View the PDF document Interaction Designers on eXtreme Programming Teams: Two Case Studies from the Real World (by Ferreira, Jennifer and Noble, James and Biddle, Robert)
View the document View the PDF document Investigating the Effectiveness of Problem Templates on Learning in Intelligent Tutoring Systems (by Mathews, Moffat and Mitrovic, Antonija)
View the document View the PDF document Knowledge Management Literature Review (by Gu, Yulong)
View the document View the PDF document Linux Kernel Development (by McDonald, Ian)
View the document View the PDF document Model Checking Nonblocking Data Structures (by Friggens, David)
View the document View the PDF document Optimised Transparent and Automated Handoff between WLAN and WWAN (by Keshariya, Mayank and Hunt, Ray)
View the document View the PDF document Parallel Logit-Logistic Fuzzy Colour Constancy and Automatic Parallel Colour Contrast Rule Extraction (by Mehta, Vrushank and Reyes, Napoleon)
View the document View the PDF document Performance of Evolving IEEE 802.11 Security Architectures (by Gin, Andrew and Baghaei, Nilufar and Hunt, Ray)
View the document View the PDF document Population-based Monte Carlo (by Hernandez, Sergio)
View the document View the PDF document Proposed Model for Security Enhancement by Algorithm Permutations (by Keshariya, Abhilasha)
View the document View the PDF document Simulation for LEGO MINDSTORMS Robotics (by Tian, Yuan and Unsworth, Keith and McKinnon, Alan)
View the document View the PDF document Tartini: The Music Analysis Tool (by McLeod, Philip)
View the document View the PDF document The Great Keyboard Debate: QWERTY versus Dvorak (by Hempstalk, Kathryn)
View the document View the PDF document Topical Indexing with WordNet (by Medelyan, Olena)
View the document View the PDF document Towards a General Model of Supporting Explanations for Constraint-based Tutoring Systems (by Weerasinghe, Amali and Mitrovic, Antonija and Martin, Brent)
View the document View the PDF document Turning the page of an electronic book (by Liesaputra, Veronica)
View the document View the PDF document Using Web services to manage data from a variety of client applications (by Deng, Yanbo and Churcher,Clare and Abell, Walt and McCallum, John)
View the document View the PDF document Verifying Privacy Preserving Auctions (by Palmer, Ben)
View the document View the PDF document Was it Pod Worthy? A Preparatory Plan for Evaluating Podcasting in Higher Education (by Wingkvist, Anna and Alexander, Jason)
View the document View the PDF document Wireless Sensor Networks for Agricultural Applications (by Bartels, Sam)
View the document View the PDF document X3D Software Visualisation (by Anslow, Craig and Marshall, Stuart and Noble, James and Biddle, Robert)