Sciweavers

903 search results - page 100 / 181
» Usability inspection methods
Sort
View
ACSD
2009
IEEE
118views Hardware» more  ACSD 2009»
15 years 5 months ago
Verifying Deadlock- and Livelock Freedom in an SOA Scenario
In a service-oriented architecture (SOA), a service broker assigns a previously published service (stored in a service registry) to a service requester. It is desirable for the co...
Karsten Wolf, Christian Stahl, Janine Ott, Robert ...
ICDAR
2009
IEEE
15 years 5 months ago
Automatic Corresponding Control Points Selection for Historical Document Image Registration
Image registration is crucial for various image analysis tasks. In particular, most approaches to correction of bleed-through distortion on handwritten document images require the...
Jie Wang, Michael S. Brown, Chew Lim Tan
ICRA
2009
IEEE
140views Robotics» more  ICRA 2009»
15 years 5 months ago
A miniature ceiling walking robot with flat tacky elastomeric footpads
—In this paper, the design, analysis, and development of a sixteen-legged palm-sized climbing robot using flat bulk tacky elastomer adhesives as an attachment method is presente...
Ozgur Unver, Metin Sitti
INFOCOM
2009
IEEE
15 years 5 months ago
Fit a Spread Estimator in Small Memory
—The spread of a source host is the number of distinct destinations that it has sent packets to during a measurement period. A spread estimator is a software/hardware module on a...
MyungKeun Yoon, Tao Li, Shigang Chen, Jih-Kwon Pei...
SEMWEB
2009
Springer
15 years 5 months ago
Functions over RDF Language Elements
Spreadsheet tools are often used in business and private scenarios in order to collect and store data, and to explore and analyze these data by executing functions and aggregation...
Bernhard Schandl