BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
automat (6)
chines (4)
imprint (4)
verif (4)
use (4)

Stem seal$ (all stems)

21 papers:

VLDBVLDB-2012-FanLZCH #named #similarity
SEAL: Spatio-Textual Similarity Search (JF, GL, LZ, SC, JH), pp. 824–835.
DACDAC-2011-IqbalSH #dependence #fault #monte carlo #named #power management #probability #scheduling
SEAL: soft error aware low power scheduling by Monte Carlo state space under the influence of stochastic spatial and temporal dependencies (NI, MAS, JH), pp. 134–139.
ICDARICDAR-2011-RenLC #automation #recognition #retrieval #segmentation
A New Method on the Segmentation and Recognition of Chinese Characters for Automatic Chinese Seal Imprint Retrieval (CR, DL, YC), pp. 972–976.
TACASTACAS-2010-BallBCMQ #concurrent #performance #testing
Preemption Sealing for Efficient Concurrency Testing (TB, SB, KEC, MM, SQ), pp. 420–434.
SACSAC-2010-RoyPL #component #detection #documentation #image #using
Seal object detection in document images using GHT of local component shapes (PPR, UP, JL), pp. 23–27.
ICDARICDAR-2009-RoyPL #approach #detection #documentation #recognition
Seal Detection and Recognition: An Approach for Document Indexing (PPR, UP, JL), pp. 101–105.
ESOPESOP-2008-MatthewsA #exclamation #morphism #parametricity #polymorphism #runtime #theorem
Parametric Polymorphism through Run-Time Sealing or, Theorems for Low, Low Prices! (JM, AA), pp. 16–31.
ICALPICALP-2005-MoranN #encryption #protocol
Basing Cryptographic Protocols on Tamper-Evident Seals (TM, MN), pp. 285–297.
POPLPOPL-2004-SumiiP #bisimulation
A bisimulation for dynamic sealing (ES, BCP), pp. 161–172.
ICDARICDAR-2001-Horiuchi #automation #verification
Automatic Seal Verification by Evaluating Positive Cost (TH), pp. 572–576.
ECOOPECOOP-2001-BibersteinGP #encapsulation
Sealing, Encapsulation, and Mutability (MB, JYG, SP), pp. 28–52.
OOPSLAOOPSLA-2001-BinderHV #approach #java
Portable Resource Control in Java: The J-SEAL2 Approach (WB, JH, AV), pp. 139–155.
OOPSLAOOPSLA-2000-ZaksFA #java
Sealed calls in Java packages (AZ, VF, NA), pp. 83–92.
ICPRICPR-1998-UedaMM #automation #verification
Automatic verification system for seal imprints on Japanese bankchecks (KU, TM, KM), pp. 629–632.
ICPRICPR-1996-HarukiHYY #3d #automation #using #verification
Automatic seal verification using three-dimensional reference seals (HH, TH, HY, KY), pp. 199–203.
ICDARICDAR-v1-1995-Chen #identification #image
Computer processing on the identification of a Chinese seal image (YSC), pp. 422–425.
ICDARICDAR-v2-1995-GaoDC #automation #verification
A system for automatic Chinese seal imprint verification (WG, SD, XC), pp. 660–664.
ICDARICDAR-v2-1995-Ueda #using
Extraction of signature and seal imprint from bankchecks by using color information (KU), pp. 665–668.
ICDARICDAR-1993-YangHT #approximate #automation #identification #using
Automatic seal identification using fluency function approximation and relaxation matching method (YY, TH, KT), pp. 786–789.
PPDPPLILP-1992-LindstromMO #functional #logic programming
Our LIPS Are Sealed: Interfacing Functional and Logic Programming Systems (GL, JM, TO), pp. 428–442.
SOSPSOSP-1981-Gifford #authentication #encryption #summary
Cryptographic Sealing for Information Secrecy and Authentication (Summary) (DKG), pp. 123–124.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.