Sciweavers

4469 search results - page 838 / 894
» Comparing and Combining Profiles
Sort
View
DAS
2008
Springer
15 years 5 months ago
A Fast Preprocessing Method for Table Boundary Detection: Narrowing Down the Sparse Lines Using Solely Coordinate Information
As the rapid growth of PDF document in digital libraries, recognizing the document structure and detecting specific document components are useful for document storage, classifica...
Ying Liu, Prasenjit Mitra, C. Lee Giles
ECAI
2008
Springer
15 years 5 months ago
Heuristics for Planning with Action Costs Revisited
We introduce a simple variation of the additive heuristic used in the HSP planner that combines the benefits of the original additive heuristic, namely its mathematical formulation...
Emil Keyder, Hector Geffner
122
Voted
EMSOFT
2008
Springer
15 years 5 months ago
Automatically transforming and relating Uppaal models of embedded systems
Relations between models are important for effective automatic validation, for comparing implementations with specifications, and for increased understanding of embedded systems d...
Timothy Bourke, Arcot Sowmya
143
Voted
IMC
2007
ACM
15 years 5 months ago
Quality-of-service class specific traffic matrices in ip/mpls networks
In this paper we consider the problem of determining traffic matrices for end-to-end demands in an IP/MPLS network that supports multiple quality of service (QoS) classes. More pr...
Stefan Schnitter, Franz Hartleb, Martin Horneffer
146
Voted
FSE
2008
Springer
143views Cryptology» more  FSE 2008»
15 years 5 months ago
Algebraic and Slide Attacks on KeeLoq
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc...
Nicolas Courtois, Gregory V. Bard, David Wagner