Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adding linguistic constraints to document image decoding: comparing the iterated complete path and stack algorithms., , , and . Document Recognition and Retrieval, volume 4307 of SPIE Proceedings, page 259-271. SPIE, (2001)Data Compression with Finite Windows., and . Commun. ACM, 32 (4): 490-505 (1989)On-Line Algorithms for Locating Checkpoints., , , and . Algorithmica, 11 (1): 33-52 (1994)A Linear Algorithm for Optimal Context Clustering with Application to Bi-level Image Coding., , and . ICIP (1), page 508-511. IEEE Computer Society, (1998)On-line algorithms for cache sharing., , and . STOC, page 422-430. ACM, (1993)Detecting and correcting malicious data in VANETs., , and . Vehicular Ad Hoc Networks, page 29-37. ACM, (2004)Labelled formal languages and their uses.. Stanford University, USA, (1983)Multi-Index Hashing for Information Retrieval, , and . FOCS, page 722-731. IEEE Computer Society, (1994)Finite-Resolution Computational Geometry, and . FOCS, page 143-152. IEEE Computer Society, (1986)Online Algorithms for Locating Checkpoints, , , and . STOC, page 359-368. ACM, (1990)