Sciweavers

766 search results - page 82 / 154
» How to Read a Signature
Sort
View
SOFTVIS
2010
ACM
13 years 7 months ago
Visual comparison of software architectures
Reverse engineering methods produce different descriptions of software architectures. In this work we analyze and define the task of exploring and comparing these descriptions. ...
Fabian Beck, Stephan Diehl
INFOCOM
2010
IEEE
13 years 6 months ago
Counting RFID Tags Efficiently and Anonymously
Radio Frequency IDentification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem...
Hao Han, Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhe...
HCI
2009
13 years 6 months ago
Accessible User Interfaces in a Mobile Logistics System
Abstract. In this paper, we focus on ICTs for young people attending occupational rehabilitation and training. An important goal is to develop ICTs that decrease the need for readi...
Harald K. Jansson, Robert Bjærum, Riitta Hel...
CORR
2011
Springer
169views Education» more  CORR 2011»
13 years 3 months ago
Lower bound for deterministic semantic-incremental branching programs solving GEN
We answer a problem posed in [GKM08] regarding a restricted model of small-space computation, tailored for solving the GEN problem. They define two variants of “incremental bra...
Dustin Wehr
BMCBI
2008
100views more  BMCBI 2008»
13 years 9 months ago
PatternLab for proteomics: a tool for differential shotgun proteomics
Background: A goal of proteomics is to distinguish between states of a biological system by identifying protein expression differences. Liu et al. demonstrated a method to perform...
Paulo C. Carvalho, Juliana S. G. Fischer, Emily I....