Author of the publication

A Digitization Pipeline for Mixed-Typed Documents Using Machine Learning and Optical Character Recognition.

, , , , and . DESRIST, volume 13229 of Lecture Notes in Computer Science, page 195-207. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Digitization Pipeline for Mixed-Typed Documents Using Machine Learning and Optical Character Recognition., , , , and . DESRIST, volume 13229 of Lecture Notes in Computer Science, page 195-207. Springer, (2022)Custom Solutions for Diverse Needs: Laying the Foundation for Tailored SETA Programs in the Healthcare Domain., , , , , , and . HICSS, page 3719-3728. ScholarSpace, (2024)Chasing Cyber Security Unicorns: A Taxonomy-based Analysis of Cyber Security Start-ups' Business Models., , , , and . ECIS, (2023)Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model., , , , , , and . HICSS, page 6118-6127. ScholarSpace, (2023)Show Me Your Claims and I'll Tell You Your Offenses: Machine Learning-Based Decision Support for Fraud Detection on Medical Claim Data., , , and . HICSS, page 1-9. ScholarSpace, (2022)Are You Aware of Your Competencies? - the potentials of Competence Research to Design Effective SETA Programs., , , , and . ECIS, (2022)Consumer Cyber Insurance as Risk Transfer: A Coverage Analysis., , , and . CENTERIS/ProjMAN/HCist, page 521-528. Elsevier, (2022)Triad or Error? Introducing Three Basic Dimensions of Competence as a Driving Force for Information Security Performance., , , and . ICIS, Association for Information Systems, (2023)