Author of the publication

Adding linguistic constraints to document image decoding: comparing the iterated complete path and stack algorithms.

, , , and . Document Recognition and Retrieval, volume 4307 of SPIE Proceedings, page 259-271. SPIE, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Compression with Finite Windows., and . Commun. ACM, 32 (4): 490-505 (1989)Adding linguistic constraints to document image decoding: comparing the iterated complete path and stack algorithms., , , and . Document Recognition and Retrieval, volume 4307 of SPIE Proceedings, page 259-271. SPIE, (2001)On-Line Algorithms for Locating Checkpoints., , , and . Algorithmica, 11 (1): 33-52 (1994)A Linear Algorithm for Optimal Context Clustering with Application to Bi-level Image Coding., , and . ICIP (1), page 508-511. IEEE Computer Society, (1998)Detecting and correcting malicious data in VANETs., , and . Vehicular Ad Hoc Networks, page 29-37. ACM, (2004)On-line algorithms for cache sharing., , and . STOC, page 422-430. ACM, (1993)Labelled formal languages and their uses.. Stanford University, USA, (1983)Online Algorithms for Locating Checkpoints, , , and . STOC, page 359-368. ACM, (1990)Multi-Index Hashing for Information Retrieval, , and . FOCS, page 722-731. IEEE Computer Society, (1994)Finite-Resolution Computational Geometry, and . FOCS, page 143-152. IEEE Computer Society, (1986)