Sciweavers

1775 search results - page 222 / 355
» Antichains on Three Levels
Sort
View
HOTOS
2003
IEEE
15 years 6 months ago
Access Control to Information in Pervasive Computing Environments
Many types of information available in a pervasive computing environment, such as people location information, should be accessible only by a limited set of people. Some propertie...
Urs Hengartner, Peter Steenkiste
99
Voted
ICDAR
2003
IEEE
15 years 6 months ago
Indexing and retrieval of words in old documents
This paper describes a system for efficient indexing and retrieval of words in collections of document images. The proposed method is based on two main principles: unsupervised pr...
Simone Marinai, Emanuele Marino, Giovanni Soda
ICDAR
2003
IEEE
15 years 6 months ago
A Model-based Line Detection Algorithm in Documents
In this paper we present a novel model based approach to detect severely broken parallel lines in noisy textual documents. It is important to detect and remove these lines so the ...
Yefeng Zheng, Huiping Li, David S. Doermann
ICNP
2003
IEEE
15 years 6 months ago
Characterizing Overlay Multicast Networks
Overlay networks among cooperating hosts have recently emerged as a viable solution to several challenging problems, including multicasting, routing, content distribution, and pee...
Sonia Fahmy, Minseok Kwon
ICNP
2003
IEEE
15 years 6 months ago
Packet Classification Using Extended TCAMs
CAMs are the most popular practical method for implementing packet classification in high performance routers. Their principal drawbacks are high power consumption and inefficient...
Ed Spitznagel, David E. Taylor, Jonathan S. Turner