Sciweavers

73 search results - page 11 / 15
» What Shadows Reveal about Object Structure
Sort
View
CLEIEJ
2004
123views more  CLEIEJ 2004»
13 years 7 months ago
BMM: A Business Modeling Method For Information Systems Development
An important premise of most of the contemporary methods for developing Software and Information Systems is that a good understanding of the application domain is essential for a ...
Jonás A. Montilva Calderón, Judith B...
CIMCA
2008
IEEE
14 years 2 months ago
A Clustering Based Denoising Technique for Range Images of Time of Flight Cameras
A relatively new technique for measuring the 3D structure of visual scenes is provided by time of flight (TOF) cameras. Reflections of modulated light waves are recorded by a pa...
Holger Schöner, Bernhard Moser, Adrian A. Dor...
SIGPLAN
2008
13 years 7 months ago
Some thoughts on teaching programming and programming languages
It is argued that the teaching of programming is central to the education of skilled computer professionals, that the teaching of programming languages is central to the teaching ...
John C. Reynolds
BMCBI
2010
124views more  BMCBI 2010»
13 years 7 months ago
A factor model to analyze heterogeneity in gene expression
Background: Microarray technology allows the simultaneous analysis of thousands of genes within a single experiment. Significance analyses of transcriptomic data ignore the gene d...
Yuna Blum, Guillaume Le Mignon, Sandrine Lagarrigu...
CTRSA
2009
Springer
128views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Short Redactable Signatures Using Random Trees
Abstract. A redactable signature scheme for a string of objects supports verification even if multiple substrings are removed from the original string. It is important that the re...
Ee-Chien Chang, Chee Liang Lim, Jia Xu