Author of the publication

A framework for detecting and selecting text line candidates of correct orientation.

, and . ICPR, page 1074-1076. IEEE Computer Society, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software., , , and . ISW, volume 1975 of Lecture Notes in Computer Science, page 82-96. Springer, (2000)Japanese Scene Character Recognition using Random Image Feature and Ensemble Scheme., and . ICPRAM, page 414-420. SciTePress, (2019)Versatile Text Extraction System for Text-to-Speech Reading Assistant Camera.. AAATE Conf., volume 217 of Studies in Health Technology and Informatics, page 392-397. IOS Press, (2015)A framework for detecting and selecting text line candidates of correct orientation., and . ICPR, page 1074-1076. IEEE Computer Society, (1998)Text Detection in Color Scene Images based on Unsupervised Clustering of Multi-channel Wavelet Features., , and . ICDAR, page 690-694. IEEE Computer Society, (2005)Dynamic VLAN Assignment for Local Users Under External IdP Management in RADIUS-Based Wi-Fi Roaming., , and . ICOIN, page 484-489. IEEE, (2024)Automatic Roaming Consortium Discovery and Routing for Large-Scale Wireless LAN Roaming Systems., and . CAMAD, page 1-6. IEEE, (2018)Scene Text Detection and Tracking for a Camera-Equipped Wearable Reading Assistant for the Blind., and . ACCV Workshops (2), volume 7729 of Lecture Notes in Computer Science, page 454-463. Springer, (2012)Real-Time Text Tracking for Text-to-Speech Translation Camera for the Blind., and . ICCHP (1), volume 8547 of Lecture Notes in Computer Science, page 658-661. Springer, (2014)Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules., , , and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 145-158. Springer, (2001)