Sciweavers

1999 search results - page 145 / 400
» Finding Reductions Automatically
Sort
View
MVA
1998
134views Computer Vision» more  MVA 1998»
15 years 3 months ago
Orientation and Scale Invariant Text Region Extraction in WWW Images
Text extraction from a web image is important for web indexing because the text can contain a key information of the web. This paper presents a method to detect a text with variou...
Taehoon Park, Dongsung Kim, Kyusik Chung
CCCG
2009
15 years 2 months ago
Inapproximability of the Perimeter Defense Problem
We model the problem of detecting intruders using a set of infrared beams by the perimeter defense problem: given a polygon P, find a minimum set of edges S of the polygon such th...
Evangelos Kranakis, Danny Krizanc, Lata Narayanan,...
IAT
2008
IEEE
15 years 1 months ago
A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots
Use of game-theoretic models to address patrolling applications has gained increasing interest in the very last years. The patrolling agent is considered playing a game against an...
Francesco Amigoni, Nicola Gatti, Antonio Ippedico
ELECTRONICMARKETS
2008
67views more  ELECTRONICMARKETS 2008»
15 years 1 months ago
Current Trends and Challenges in Electronic Procurement: An Empirical Study
The following paper presents results from a longitudinal study on the use of ICT for B2B-related business processes in large Swiss companies. In an empirical survey, 68 questionna...
Christian Tanner, Ralf Wölfle, Petra Schubert...
IJISEC
2008
101views more  IJISEC 2008»
15 years 1 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna