We study an automatic technique for the verification of cryptographic protocols based on a Horn clause model of the protocol. This technique yields proofs valid for an unbounded ...
This paper proposes a novel dewarping technique for document images of bound volumes. This technique is a kind of model fitting techniques for estimating the warp of each text li...
In this paper, a new model is proposed for image segmentation that integrates the curve evolution and anisotropic diffusion methods. The curve evolution method, utilizing both grad...
Yongsheng Pan, J. Douglas Birdwell, Seddik M. Djou...
SQL extensions that allow queries to explicitly specify data quality requirements in terms of currency and consistency were proposed in an earlier paper. This paper develops a dat...
Abstract. One of the most appealing features of constraint programming is its rich constraint language for expressing combinatorial optimization problems. This paper demonstrates t...