Sciweavers

2 search results - page 1 / 1
» sec 1992
Sort
View
SEC
1992
15 years 4 months ago
Cryptographic Protocols and Network Security
Patrick Horster, Hans-Joachim Knobloch
117
Voted
ICDAR
2003
IEEE
15 years 8 months ago
A Constraint-based Approach to Table Structure Derivation
er presents an approach to deriving an abstract geometric model of a table from a physical representation. The technique developed uses a graph of constraints between cells which ...
Matthew Hurst