Sciweavers

3555 search results - page 548 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
MKM
2005
Springer
15 years 9 months ago
Computational Origami of a Morley's Triangle
Abstract. We present a computational origami construction of Morley’s triangles and automated proof of correctness of the generalized Morley’s theorem in a streamlined process ...
Tetsuo Ida, Hidekazu Takahashi, Mircea Marin
PREMI
2005
Springer
15 years 9 months ago
Eliciting Domain Knowledge in Handwritten Digit Recognition
Pattern recognition methods for complex structured objects such as handwritten characters often have to deal with vast search spaces. Developed techniques, despite significant adv...
Tuan Trung Nguyen
ECLIPSE
2004
ACM
15 years 9 months ago
FeaturePlugin: feature modeling plug-in for Eclipse
Feature modeling is a key technique used in product-line development to model commonalities and variabilities of productline members. In this paper, we present FeaturePlugin, a fe...
Michal Antkiewicz, Krzysztof Czarnecki
EUROPAR
2004
Springer
15 years 9 months ago
Modular On-chip Multiprocessor for Routing Applications
Abstract. Simulation platforms for network processing still have difficulties in finding a good compromise between speed and accuracy. This makes it difficult to identify the caus...
Saifeddine Berrayana, Etienne Faure, Daniela Geniu...
HICSS
2003
IEEE
87views Biometrics» more  HICSS 2003»
15 years 9 months ago
Studying Teamwork in Global IT Support
As modern organizations increasingly operate in a global economy, they need IT support around the globe; favorable economic conditions also encourage the use of offshore IT teams....
Elizabeth Davidson, Albert S. M. Tay