Thank u all, I will try to use what you tell me and let you know if it was
ok. =)

I only find this examples : http://docs.mitk.org/nightly/examples.html, and
the mitk tutorial.

But are there more examples, somewhat specific for each class, or something
like that?

-- 
--------
Gonzalo Amadio
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
mitk-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/mitk-users

Reply via email to