Sciweavers

3235 search results - page 377 / 647
» Partial Redundant Modeling
Sort
View
CSFW
2005
IEEE
15 years 10 months ago
Reconstruction of Attacks against Cryptographic Protocols
We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
Xavier Allamigeon, Bruno Blanchet
ICDAR
2005
IEEE
15 years 10 months ago
Dewarping of document image by global optimization
This paper proposes a novel dewarping technique for document images of bound volumes. This technique is a kind of model fitting techniques for estimating the warp of each text li...
Hironori Ezaki, Seiichi Uchida, Akira Asano, Hiroa...
ISM
2005
IEEE
149views Multimedia» more  ISM 2005»
15 years 10 months ago
Image Segmentation Using Curve Evolution and Anisotropic Diffusion: An Integrated Approach
In this paper, a new model is proposed for image segmentation that integrates the curve evolution and anisotropic diffusion methods. The curve evolution method, utilizing both grad...
Yongsheng Pan, J. Douglas Birdwell, Seddik M. Djou...
139
Voted
VLDB
2005
ACM
133views Database» more  VLDB 2005»
15 years 10 months ago
Caching with 'Good Enough' Currency, Consistency, and Completeness
SQL extensions that allow queries to explicitly specify data quality requirements in terms of currency and consistency were proposed in an earlier paper. This paper develops a dat...
Hongfei Guo, Per-Åke Larson, Raghu Ramakrish...
138
Voted
CP
2004
Springer
15 years 10 months ago
Constraint-Based Combinators for Local Search
Abstract. One of the most appealing features of constraint programming is its rich constraint language for expressing combinatorial optimization problems. This paper demonstrates t...
Pascal Van Hentenryck, Laurent Michel, Liyuan Liu