Sciweavers

429 search results - page 72 / 86
» Multiple sweeping using the Denavit-Hartenberg representatio...
Sort
View
ECCV
2008
Springer
14 years 10 months ago
Signature-Based Document Image Retrieval
As the most pervasive method of individual identification and document authentication, signatures present convincing evidence and provide an important form of indexing for effectiv...
Guangyu Zhu, Yefeng Zheng, David S. Doermann
SIGSOFT
2003
ACM
14 years 9 months ago
A family of test adequacy criteria for database-driven applications
Although a software application always executes within a particular environment, current testing methods have largely ignored these environmental factors. Many applications execut...
Gregory M. Kapfhammer, Mary Lou Soffa
WCRE
1997
IEEE
14 years 15 days ago
Reverse Engineering is Reverse Forward Engineering
Reverse Engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering per...
Ira D. Baxter, Michael Mehlich
ASSETS
2005
ACM
13 years 11 months ago
Representing coordination and non-coordination in an american sign language animation
While strings and syntax trees are used by the Natural Language Processing community to represent the structure of spoken languages, these encodings are difficult to adapt to a si...
Matt Huenerfauth
RECOMB
2010
Springer
13 years 10 months ago
Subnetwork State Functions Define Dysregulated Subnetworks in Cancer
Abstract. Emerging research demonstrates the potential of proteinprotein interaction (PPI) networks in uncovering the mechanistic bases of cancers, through identification of intera...
Salim A. Chowdhury, Rod K. Nibbe, Mark R. Chance, ...