Author of the publication

Safely selecting subsets of training data.

, , and . Document Analysis Systems, page 433-440. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An artwork design verification system., and . DAC, page 414-420. ACM, (1975)Structured document image analysis., , and . Springer, (1999)A Statistical, Nonparametric Methodology for Document Degradation Model Validation., , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 22 (11): 1209-1223 (2000)Coordination Software for Robotic Workcells., , and . ICRA, page 354-360. IEEE, (1984)Document Analysis Systems for Digital Libraries: Challenges and Opportunities., , and . Document Analysis Systems, volume 3163 of Lecture Notes in Computer Science, page 1-16. Springer, (2004)Document image defect models and their uses.. ICDAR, page 62-67. IEEE Computer Society, (1993)Character-to-Character Sentiment Analysis in Shakespeare's Plays., and . ACL (2), page 479-483. The Association for Computer Linguistics, (2013)Handwritten zip code recognition with multilayer networks., , , , , , , , and . ICPR (2), page 35-40. IEEE, (1990)Estimating the intrinsic difficulty of a recognition problem., and . ICPR (2), page 178-183. IEEE, (1994)Truthing for Pixel-Accurate Segmentation., , and . Document Analysis Systems, page 379-385. IEEE Computer Society, (2008)