Sciweavers

2 search results - page 1 / 1
» sec 1992
Sort
View
SEC
1992
13 years 6 months ago
Cryptographic Protocols and Network Security
Patrick Horster, Hans-Joachim Knobloch
ICDAR
2003
IEEE
13 years 10 months ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst