Browsing- and querying-oriented schemes have long served as the principal techniques for software developers to locate software components from a component repository for reuse. Un...
ts the abstraction of e-Transactions in three-tier architectures. Three-tier architectures are typically Internetoriented architectures, where the end-user interacts with frontend ...
This paper focuses on a scheme for automated tumor recognition using images acquired during endoscopic sessions. The proposed recognition system is based on multi-layer feed forwa...
S. A. Karkanis, Dimitrios K. Iakovidis, Dimitrios ...
The biggest limitation of Radio over Fiber (ROF) links in a wireless network is its limited dynamic range due to ‘Non Linear Distortions’ (NLD). In this paper a higher orde...
Experimental evaluation of clustering techniques for component recovery is necessary in order to analyze their strengths and weaknesses in comparison to other techniques. For comp...