In this paper, a new deformable contour method derived from a constrained contour energy minimization framework is presented. By imposing a constraint of region, which can be any ...
CT This paper describes experiences from two organizations that have used the Riskit method for risk management in their software projects. This paper presents the Riskit method, t...
This paper presents an unified view of most previous table-lookup-and-addition methods: bipartite tables, SBTM, STAM and multipartite methods. This new definition allows a more ac...
We compare the purposes, inputs, representations, and assumptions of three methods to evaluate the fine-grained interactions of intelligent tutors with their students. One method i...
A method was proposed in this journal (vol. 6, no. 1, pp. 192-201, 2007), which tackles a power allocation problem for interleave-division multiple-access (IDMA) systems over fadin...