Sciweavers

2216 search results - page 316 / 444
» Integration of Usability Techniques into the Software Develo...
Sort
View
HICSS
2007
IEEE
140views Biometrics» more  HICSS 2007»
15 years 10 months ago
Design Pattern Evolution and Verification Using Graph Transformation
This paper presents a graph transformation based approach to design pattern evolution. An evolution of a design pattern includes modifications of pattern elements, such as classes...
Chunying Zhao, Jun Kong, Kang Zhang
ICPPW
2008
IEEE
15 years 11 months ago
Energy Modeling of Processors in Wireless Sensor Networks Based on Petri Nets
Power minimization is a serious issue in wireless sensor networks to extend the lifetime and minimize costs. However, in order to gain an accurate understanding of issues regardin...
Ali Shareef, Yifeng Zhu
GFKL
2005
Springer
117views Data Mining» more  GFKL 2005»
15 years 10 months ago
A Cross-cultural Evaluation Framework for Behavioral Biometric User Authentication
Today biometric techniques are based either on passive (e.g. IrisScan, Face) or active methods (e.g. voice and handwriting). In our work we focus on evaluation of the latter. These...
Franziska Wolf, T. K. Basu, Pranab K. Dutta, Claus...
BMCBI
2006
120views more  BMCBI 2006»
15 years 4 months ago
The Virtual Insect Brain protocol: creating and comparing standardized neuroanatomy
Background: In the fly Drosophila melanogaster, new genetic, physiological, molecular and behavioral techniques for the functional analysis of the brain are rapidly accumulating. ...
Arnim Jenett, Johannes E. Schindelin, Martin Heise...
JRTIP
2008
249views more  JRTIP 2008»
15 years 4 months ago
Model-based mapping of reconfigurable image registration on FPGA platforms
Abstract Image registration is a computationally intensive application in the medical imaging domain that places stringent requirements on performance and memory management efficie...
Mainak Sen, Yashwanth Hemaraj, William Plishker, R...