Sciweavers

766 search results - page 46 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
CAV
2011
Springer
253views Hardware» more  CAV 2011»
12 years 11 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
WWW
2004
ACM
14 years 8 months ago
Composite events for xml
Recently, active behavior has received attention in the XML field to automatically react to occurred events. Aside from proprietary approaches for enriching XML with active behavi...
Martin Bernauer, Gerti Kappel, Gerhard Kramler
ICC
2007
IEEE
14 years 2 months ago
Robust Code Acquisition in the Presence of BOC Modulation for Future Galileo Receivers
— The problem of code acquisition for the Galileo system is investigated in this paper. The effect of non-ideal sampling on the Binary Offset Carrier (BOC) modulated signal is ev...
Marco Villanti, Claudio Palestini, Raffaella Pedon...
DAS
2006
Springer
13 years 11 months ago
Segmentation-Driven Recognition Applied to Numerical Field Extraction from Handwritten Incoming Mail Documents
Abstract. In this paper, we present a method for the automatic extraction of numerical fields (zip codes, phone numbers, etc.) from incoming mail documents. The approach is based o...
Clément Chatelain, Laurent Heutte, Thierry ...
CG
2007
Springer
13 years 7 months ago
Visual text mining using association rules
In many situations, individuals or groups of individuals are faced with the need to examine sets of documents to achieve understanding of their structure and to locate relevant in...
Alneu de Andrade Lopes, Roberto Pinho, Fernando Vi...