Author of the publication

Algorithms for extracting text from degraded document images

. Nanyang Technological University, Singapore, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Late Breaking Results: Analytical Placement for 3D ICs with Multiple Manufacturing Technologies., , , , , and . DAC, page 1-2. IEEE, (2023)Estimating Bus Cross-Sectional Flow Based on Machine Learning Algorithm Combined with Wi-Fi Probe Technology., , and . Sensors, 21 (3): 844 (2021)Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation Search., , and . ACIS-ICIS, page 1135-1140. IEEE Computer Society, (2007)First Mile in Crowdsourced Live Streaming: A Content Harvest Network Approach., , , , and . ACM Multimedia (Thematic Workshops), page 101-109. ACM, (2017)Impact of Power Distribution Network on Power Analysis Attacks in Three-Dimensional Integrated Circuits., , , , and . ACM Great Lakes Symposium on VLSI, page 327-332. ACM, (2017)AppsPlayground: automatic security analysis of smartphone applications., , and . CODASPY, page 209-220. ACM, (2013)A Hybrid Spatio-Temporal Data Model and Structure (HST-DMS) for Efficient Storage and Retrieval of Land Use Information., and . Trans. GIS, 8 (3): 351-366 (2004)Exploring Privacy-Accuracy Tradeoffs using DPComp., , , , , and . SIGMOD Conference, page 2101-2104. ACM, (2016)Principled Evaluation of Differentially Private Algorithms using DPBench., , , , and . SIGMOD Conference, page 139-154. ACM, (2016)A tribal abstraction network for SNOMED CT target hierarchies without attribute relationships., , , , , , and . JAMIA, 22 (3): 628-639 (2015)