Sciweavers

6941 search results - page 1113 / 1389
» Testing as a Certification Approach
Sort
View
134
Voted
AFRIGRAPH
2007
ACM
15 years 9 months ago
Efficient editing of aged object textures
Real objects present an enormous amount of detail, including aging effects. Artists need an intuitive control when they iteratively review and redesign their work to achieve a spe...
Olivier Clément, Jocelyn Benoit, Eric Paque...
AUSAI
2007
Springer
15 years 9 months ago
Branching Rules for Satisfiability Analysed with Factor Analysis
Factor analysis is a statistical technique for reducing the number of factors responsible for a matrix of correlations to a smaller number of factors that may reflect underlying va...
Richard J. Wallace, Stuart Bain
CAISE
2009
Springer
15 years 9 months ago
Configurable Process Models: Experiences from a Municipality Case Study
Configurable process models integrate different variants of a business process into a single model. Through configuration users of such models can then combine the variants to deri...
Florian Gottschalk, Teun A. C. Wagemakers, Monique...
149
Voted
MAMMO
2010
Springer
15 years 9 months ago
Combined Reconstruction and Registration of Digital Breast Tomosynthesis
Digital breast tomosynthesis (DBT) has the potential to enhance breast cancer detection by reducing the confounding effect of superimposed tissue associated with conventional mamm...
Guang Yang, John H. Hipwell, Matthew J. Clarkson, ...
156
Voted
COMPSAC
2007
IEEE
15 years 9 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
« Prev « First page 1113 / 1389 Last » Next »