Author of the publication

Table Detection from Plain Text Using Machine Learning and Document Structure.

, , , and . APWeb, volume 3841 of Lecture Notes in Computer Science, page 818-823. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The refinement of a Q-matrix: Assessing methods to validate tasks to skills mapping., , and . EDM, page 208-311. International Educational Data Mining Society (IEDMS), (2014)Threshold detection of intensity flashes in the blowfly photoreceptor by an ideal observer., and . Neurocomputing, (2005)Development of an Instrument to Study the Use of Recommendation Systems., , , , and . AMCIS, page 34. Association for Information Systems, (2003)Towards Efficient Yet Privacy-Preserving Approximate Search in Cloud Computing., , , , and . Comput. J., 57 (2): 241-254 (2014)Circularly polarized bistatic scattering from sastrugi surfaces., and . IGARSS, page 4928-4931. IEEE, (2017)Accelerated Stochastic Power Iteration., , , , and . CoRR, (2017)Dynamic characteristics and related trapping effects of GaN-based Fin-MISHEMTs., , , , , , , , , and . ASICON, page 584-587. IEEE, (2017)Dependency of current collapse on the device structure of GaN-based HEMTs., , , , , , , , , and . ASICON, page 1-4. IEEE, (2015)GIANT: Globally Improved Approximate Newton Method for Distributed Optimization., , , and . CoRR, (2017)Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack., and . IACR Cryptology ePrint Archive, (2010)