Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Line segmentation is the first and the most critical pre-processing step for a document recognition/analysis task. Complex handwritten documents with lines running into each other...
Kamal Kuzhinjedathu, Harish Srinivasan, Sargur N. ...
In this paper we give an overview of the coDB semantically well-founded P2P DB system. A network of databases, possibly with different schemas, are interconnected by means of GLAV ...
Enrico Franconi, Gabriel M. Kuper, Andrei Lopatenk...
In this paper we present an algorithm for structure and motion (SM) recovery under affine projection from video sequences. The algorithm tracks the motion of a single structure, b...
Much work has been done to address the need for incentive models in real deployed peer-to-peer networks. In this paper, we discuss problems found with the incentive model in a lar...
Qiao Lian, Yu Peng, Mao Yang, Zheng Zhang, Yafei D...