This paper describes a method for manipulating a threedimensional object without considering conventional three independent orthogonal views. We apply the direct manipulation to o...
A general technique for merging database schemas is developed that has a number of advantages over existing techniques, the most important of which is that schemas are placed in a...
Boundary overflows are caused by violation of constraints, mostly limiting the range of internal values of a program, and can be provoked by an intruder to gain control of or acce...
In this work we report the results of a discrete time simulation model that we developed for an equipment rental business to study the impact of business decisions. The whole tool...
R. Alan Bowman, Ira J. Haimowitz, Robert M. Matthe...
Our proposed approach to text and line-art extraction requires accurately locating a text-string box and identifying external line vectors incident on the box. The results of extra...
Luyang Li, George Nagy, Ashok Samal, Sharad C. Set...