This paper presents a detailed comparative study of 4 rotation invariant texture analysis methods. Human subjects are included as a benchmark for the computational methods. Experi...
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Text extraction from a web image is important for web indexing because the text can contain a key information of the web. This paper presents a method to detect a text with variou...
This paper presents an implemented, psychologicallyplausible parsing model for Government Binding theory grammars. I make use of two main ideas: (1) a generalization of the licens...
The tree constraint partitions a directed graph into node-disjoint trees. In many practical applications that involve such a partition, there exist side constraints specifying requ...