Given an equational system, completion procedures compute an equivalent and complete (terminating and confluent) term rewrite system. We present a very simple and efficient compl...
We present a new security technology called the Multilayer Firewall. We argue that it is useful in some situations for which other approaches, such as cryptographically protected ...
Abstract. This paper proposes an approach for automatic road extraction in aerial imagery which exploits the scale-space behavior of roads in combination with geometric constrained...
This paper investigates the homography which transforms a set of points in projective space when undergoing a rigid translation, termed a projective translation. A representation ...
Abstract. We introduce a continuous scale wavelet detector. Our algorithm was able to detect a mass that could not be seen using conventional windowing and leveling or traditional ...