Sciweavers

1999 search results - page 145 / 400
» Finding Reductions Automatically
Sort
View
MVA
1998
134views Computer Vision» more  MVA 1998»
14 years 11 months ago
Orientation and Scale Invariant Text Region Extraction in WWW Images
Text extraction from a web image is important for web indexing because the text can contain a key information of the web. This paper presents a method to detect a text with variou...
Taehoon Park, Dongsung Kim, Kyusik Chung
CCCG
2009
14 years 11 months ago
Inapproximability of the Perimeter Defense Problem
We model the problem of detecting intruders using a set of infrared beams by the perimeter defense problem: given a polygon P, find a minimum set of edges S of the polygon such th...
Evangelos Kranakis, Danny Krizanc, Lata Narayanan,...
IAT
2008
IEEE
14 years 10 months ago
A Game-Theoretic Approach to Determining Efficient Patrolling Strategies for Mobile Robots
Use of game-theoretic models to address patrolling applications has gained increasing interest in the very last years. The patrolling agent is considered playing a game against an...
Francesco Amigoni, Nicola Gatti, Antonio Ippedico
ELECTRONICMARKETS
2008
67views more  ELECTRONICMARKETS 2008»
14 years 10 months ago
Current Trends and Challenges in Electronic Procurement: An Empirical Study
The following paper presents results from a longitudinal study on the use of ICT for B2B-related business processes in large Swiss companies. In an empirical survey, 68 questionna...
Christian Tanner, Ralf Wölfle, Petra Schubert...
IJISEC
2008
101views more  IJISEC 2008»
14 years 10 months ago
SAT-based model-checking for security protocols analysis
We present a model checking technique for security protocols based on a reduction to propositional logic. At the core of our approach is a procedure that, given a description of th...
Alessandro Armando, Luca Compagna