Abstract. Data security is well-recognized a vital issue in an information system that is supported in an outsource environment. However, most of conventional XML encryption propos...
A comparison of several indexing techniques for complex object in object-oriented database systems is presented, based on assumption of non-uniform distribution of attribute value...
This paper presents a method for vectorizing the graphical parts of paper-based line drawings. The method consists of separating the input binary image into layers of homogeneous t...
Some "non-' or "extra-functional" features, such as reliability, security, and tracing, defy modularization mechanisms in programming languages. This makes suc...
Eric Wohlstadter, Stoney Jackson, Premkumar T. Dev...
Recognition of handwritten manuscripts is essential for efficient content exploitation of the valuable Old Greek historical collections. In this paper, we focus on the problem of ...
Kostas Ntzios, Basilios Gatos, Ioannis Pratikakis,...