Sciweavers

1527 search results - page 99 / 306
» What About Wednesday
Sort
View
ICPR
2008
IEEE
14 years 10 months ago
How much handwritten text is needed for text-independent writer verification and identification
The performance of off-line text-independent writer verification and identification increases when the documents contain more text. This relation was examined by repeatedly conduc...
Axel Brink, Lambert Schomaker, Marius Bulacu
MICCAI
2002
Springer
14 years 10 months ago
Evaluation of Image Quality in Medical Volume Visualization: The State of the Art
For applications of volume visualization in medicine, it is important to assure that the 3D images show the true anatomical situation, or at least to know about their limitations. ...
Andreas Pommert, Karl Heinz Höhne
SIGCSE
2010
ACM
166views Education» more  SIGCSE 2010»
14 years 4 months ago
Braided teaching in secondary CS education: contexts, continuity, and the role of programming
In this paper, we propose a new approach to thinking about and implementing Computer Science curricula in secondary education. The characteristic feature is to organize the items ...
Arno Pasternak, Jan Vahrenhold
HICSS
2009
IEEE
125views Biometrics» more  HICSS 2009»
14 years 4 months ago
Conceptualizing Interpersonal Interruption Management: A Theoretical Framework and Research Program
Previous research exploring interpersonal-technologymediated interruptions has focused on understanding how the knowledge of an individual’s local context can be utilized to redu...
Sukeshini A. Grandhi, Quentin Jones
FSEN
2009
Springer
14 years 3 months ago
Equational Reasoning on Ad Hoc Networks
We provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. We exploit an extended algebra called Computed Network Theory to axiomatize...
Fatemeh Ghassemi, Wan Fokkink, Ali Movaghar