Content of Issue 1
 DOI: 10.3217/jucs-015-01
 | 
 
| Logic, Abstract State Machines and Databases | 
K.-D. Schewe | 
1 | 
 
| On Defining the Behavior of OR-joins in Business Process Models | 
E. Börger, O. Sörensen, B. Thalheim | 
3 | 
 
| Dynamic Query Optimization under Access Limitations and Dependencies | 
A. Calì, D. Calvanese, D. Martinenghi | 
33 | 
 
| Non-Denumerable Infinitary Modal Logic | 
M.J. Cresswell | 
63 | 
 
| Reasoning about Nonblocking Concurrency | 
L. Groves | 
72 | 
 
| Weak Functional Dependencies: Full Propositional Expressiveness for the Database Practitioner | 
S. Hartmann, S. Link | 
112 | 
 
| Using Abstract State Machines to Model ARIES-based Transaction Processing | 
M. Kirchberg | 
157 | 
 
| Global Database Design based on Storage Space and Update Time Minimization | 
H. Köhler | 
195 | 
 
| Formal Verification of Semistructured Data Models in PVS | 
S.U.-J. Lee, G. Dobbie, J. Sun, L. Groves | 
241 | 
 
| A Formal Framework of Aggregation for the OLAP-OLTP Model | 
H.-J. Lenz, B. Thalheim | 
273 | 
 
| A Characterisation of Coincidence Ideals for Complex Values | 
A. Sali, K.-D. Schewe | 
304 | 
 
| Dynamic Data Warehouse Design with Abstract State Machines | 
J. Zhao, K.-D. Schewe, H. Koehler | 
355 | 
 
 
Content of Issue 3
 DOI: 10.3217/jucs-015-03
 | 
 
| Managing Editor's Column | 
H. Maurer | 
505 | 
 
| Advances in Homomorphic Cryptosystems | 
M. Akinwande | 
506 | 
 
| Linear and Quadratic Complexity Bounds on the Values of the Positive Roots of Polynomials | 
A.G. Akritas | 
523 | 
 
| DS RBAC - Dynamic Sessions in Role Based Access Control | 
J.R. Mühlbacher, C. Praher | 
538 | 
 
| A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing | 
A. Ruiz-Martínez, C.I. Marín-López, L. Baño-López, A.F. Gómez-Skarmeta | 
555 | 
 
| Structural Coverage Criteria for Testing SQL Queries | 
M.J. Suárez-Cabal, J. Tuya | 
584 | 
 
| Supporting Composition of Structural Aspects in an AOP Kernel | 
É. Tanter, J. Fabry | 
620 | 
 
| Modelling Mailing List Behaviour in Open Source Projects: the Case of ARM Embedded Linux | 
S.L. Toral, R. Martínez Torres, F. Barrero | 
648 | 
 
| Knowledge Sharing and Collaborative Learning in Second Life: A Classification of Virtual 3D Group Interaction Scripts | 
A. Schmeil, M.J. Eppler | 
665 | 
 
| Providing Multi Source Tag Recommendations in a Social Resource Sharing Platform | 
M. Memmel, M. Kockler, R. Schirru | 
678 | 
 
| Web 2.0 Adoption by Danish Newspapers - Urgent Need for New Business Models? | 
N. Bjørn-Andersen, L. Bloch Rasmussen, S. Rasmussen | 
692 | 
 
 
Content of Issue 4
 DOI: 10.3217/jucs-015-04
 | 
 
| Knowledge Management for Autonomous Systems and Computational Intelligence | 
N.T. Nguyen, D.-S. Huang | 
704 | 
 
| An Efficient Data Preprocessing Procedure for Support Vector Clustering | 
J.-S. Wang, J.-C. Chiang | 
705 | 
 
| PDE-PEDA: A New Pareto-Based Multi-objective Optimization Algorithm | 
X. Wang, M. Hao, Y. Cheng, R. Lei | 
722 | 
 
| Integrative Discovery of Multifaceted Sequence Patterns by Frame-Relayed Search and Hybrid PSO-ANN | 
S.-W. Liou, C.-M. Wang, Y.-F. Huang | 
742 | 
 
| A Quantum-Inspired Immune Algorithm for Hybrid Flow Shop with Makespan Criterion | 
Q. Niu, T. Zhou, S. Ma | 
765 | 
 
| Graph-based Approach for Robust Road Guidance Sign Recognition from Differently Exposed Images | 
A. Vavilin, K.-H. Jo | 
786 | 
 
| Fingerprinting Lexical Contexts over the Web | 
V. Di Lecce, M. Calabrese, D. Soldo | 
805 | 
 
| Bayesian Gene Regulatory Network Inference Optimization by means of Genetic Algorithms | 
V. Bevilacqua, G. Mastronardi, F. Menolascina, P. Pannarale, G. Romanazzi | 
826 | 
 
| Multilayer Ensemble Pruning via Novel Multi-sub-swarm Particle Swarm Optimization | 
J. Zhang, K.-W. Chau | 
840 | 
 
| A DCM Based Orientation Estimation Algorithm with an Inertial Measurement Unit and a Magnetic Compass | 
N.H.Q. Phuong, H.-J. Kang, Y.-S. Suh, Y.-S. Ro | 
859 | 
 
| Complexity Analysis of Ontology Integration Methodologies:a Comparative Study | 
T.H. Duong, G.S. Jo, J.J. Jung, N.T. Nguyen | 
877 | 
 
| SDLMAS: A Scenario Modeling Framework for Multi-Agent Systems | 
I. Čavrak, A. Stranjak, M. Žagar | 
898 | 
 
| A Personalized URL Re-ranking Method using Psychological User Browsing Characteristics | 
S. Ahmed, S. Park, J.J. Jung, S. Kang | 
926 | 
 
| Agent Migration: Framework for Analysis | 
D. Król, A. Lupa | 
941 | 
 
 
Content of Issue 5
 DOI: 10.3217/jucs-015-05
 | 
 
| Data Security and Privacy Protection in Pervasive Computing Environments | 
B.-S. Koh, M. Denko, S. Gritzalis, C.-H. Hsu | 
967 | 
 
| Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents | 
P. Najera, F. Moyano, J. Lopez | 
970 | 
 
| Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols | 
P. Pecho, F. Zboril Jr., M. Drahansky, P. Hanacek | 
992 | 
 
| Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments | 
C. Lee, J. Kim, S. Hong, Y.-S. Lee | 
1007 | 
 
| Protecting Mobile TV Multimedia Content in   DVB/GPRS Heterogeneous Wireless Networks | 
S. Lian, Y. Zhang | 
1023 | 
 
| Light-Weight Key Exchange with Different Passwords in the Standard Model | 
J.O. Kwon, I.R. Jeong, D.H. Lee | 
1042 | 
 
| USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework | 
J.H. Park | 
1065 | 
 
| Vascular Pattern Analysis towards Pervasive  Palm Vein Authentication | 
D. Bhattacharyya, P. Das, T.-h. Kim, S.K. Bandyopadhyay | 
1081 | 
 
| Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network | 
Y.H. Ho, A.H. Ho, K.A. Hua, F. Xie | 
1090 | 
 
| A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security | 
N. Xiong, J. He, J.H. Park, D. Cooley, Y. Li | 
1119 | 
 
 
Content of Issue 6
 DOI: 10.3217/jucs-015-06
 | 
 
| Computability and Complexity in Analysis | 
V. Brattka, P. Collins, R. Rettinger | 
1143 | 
 
| On the Effective Existence of Schauder Bases | 
V. Bosserhoff | 
1145 | 
 
| Effective Computability of Solutions of Differential Inclusions The Ten Thousand Monkeys Approach | 
P. Collins, D.S. Graça | 
1162 | 
 
| Oracles and Relativizations of the P =? NP Question for Several Structures | 
C. Gaßner | 
1186 | 
 
| Chainable and Circularly Chainable Co-r.e. Sets in Computable Metric Spaces | 
Z. Iljazović | 
1206 | 
 
| Constructive Urysohn Universal Metric Space | 
D. Lešnik | 
1236 | 
 
| Fine-computable Functions on the Unit Square and their Integral | 
T. Mori, M. Yasugi, Y. Tsujii | 
1264 | 
 
| Representing Measurement Results | 
A. Pauly | 
1280 | 
 
| Topological Complexity of Blowup Problems | 
R. Rettinger, K. Weihrauch, N. Zhong | 
1301 | 
 
| An Effective Tietze-Urysohn Theorem for QCB-Spaces | 
M. Schröder | 
1317 | 
 
| Computing the Solution Operators of Symmetric Hyperbolic Systems of PDE | 
S. Selivanova, V. Selivanov | 
1337 | 
 
| On Finite-time Computability Preserving Conversions | 
H. Tsuiki, S. Yamada | 
1365 | 
 
| Elementary Computable Topology | 
K. Weihrauch, T. Grubba | 
1381 | 
 
 
Content of Issue 7
 DOI: 10.3217/jucs-015-07
 | 
 
| Computers in Education: Advances in Software Technology | 
J.Á. Velázquez-Iturbide, F.J. García-Peñalvo | 
1423 | 
 
| Innovation and Quality in e-Learning: a European Perspective | 
C. Dondi | 
1427 | 
 
| A Meta-modeling based Approach for the Multi-Disciplinary Design of Web Educational Systems | 
P. Díaz, E. Guerra, T. Zarraonandía, I. Aedo, C.L. Padrón | 
1440 | 
 
| Application Scenarios for the Learning Objects Pool | 
P. Dinis, A. Rodrigues da Silva | 
1455 | 
 
| Learning to Program with COALA, a Distributed Computer Assisted Environment | 
F. Jurado, A.I. Molina, M.A. Redondo, M. Ortega, A. Giemza, L. Bollen, H.U. Hoppe | 
1472 | 
 
| TQ-Bot: An AIML-based Tutor and Evaluator Bot | 
F.A. Mikic Fonte, J.C. Burguillo Rial, M. Llamas-Nistal | 
1486 | 
 
| Eduquito: Virtual Environment for Digital Inclusion of People with Special Educational Needs | 
L.M. Costi Santarosa, L. de Oliveira Basso | 
1496 | 
 
| Development of a Web Application for Management of Learning Styles | 
R. Silva, A. Andrade | 
1508 | 
 
| Semantic Spiral Timelines Used as Support for e-Learning | 
D.A.G. Aguilar, R. Therón, F.J. García-Peñalvo | 
1526 | 
 
| Visualization of Syntax Trees for Language Processing Courses | 
F.J. Almeida-Martínez, J. Urquiza-Fuentes, J.Á. Velázquez-Iturbide | 
1546 | 
 
 
Content of Issue 8
 DOI: 10.3217/jucs-015-08
 | 
 
| Managing Editor's Column | 
H. Maurer | 
1562 | 
 
| Tools and Stochastic Metrics for Debugging Temporal Behaviour of Real-Time Systems | 
J. Entrialgo, J. García, J.L. Díaz, D.F. García | 
1563 | 
 
| Modelling Weblog Success: Case of Korea | 
J. Hwang, Y. Lee, S. Kim | 
1589 | 
 
| Designing Secure Data Warehouses by Using MDA and QVT | 
E. Soler, J. Trujillo, C. Blanco, E. Fernández-Medina | 
1607 | 
 
| Computing as Engineering | 
M. Tedre | 
1642 | 
 
| Certificate-based Signatures Revisited | 
W. Wu, Y. Mu, W. Susilo, X. Huang | 
1659 | 
 
| Discovering Semantic Aspects of  Socially Constructed Knowledge Hierarchy  to Boost the Relevance of Web Searching | 
D. Zhu, H. Dreher | 
1685 | 
 
| ActiveTM - The Factory for Domain-customised Portal Engines | 
L. Maicher, B. Bock | 
1711 | 
 
| Fostering Knowledge Flow and Community Engagement in the Development of Interactive Entertainment | 
S. Lohmann, J. Niesenhaus, P. Heim, J. Ziegler | 
1722 | 
 
| Success and Failure Factors for KM: The Utilization of Knowledge in the Swedish Armed Forces | 
U. Pettersson | 
1735 | 
 
 
Content of Issue 9
 DOI: 10.3217/jucs-015-09
 | 
 
| CSCWD Technologies, Applications and Challenges | 
J. Yong, W. Shen, J.A. Pino | 
1744 | 
 
| Organizational Simulation of Complex  Process Engineering Projects in the Chemical Industry | 
S. Tackenberg, B. Kausch, S. Duckwitz, C.M. Schlick, S. Karahancer | 
1746 | 
 
| A Tree Similarity Measuring Method and its Application to Ontology Comparison | 
Y. Xue, C. Wang, H.H. Ghenniwa, W. Shen | 
1766 | 
 
| Authorization Algorithms for Permission-Role Assignments | 
L. Sun, H. Wang, J. Yong | 
1782 | 
 
| A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme | 
J. Luo, X. Wang, M. Yang | 
1797 | 
 
| Estimating Software Projects Based On Negotiation | 
S.F. Ochoa, J.A. Pino, F. Poblete | 
1812 | 
 
| MC-Supporter: Flexible Mobile Computing Supporting Learning though Social Interactions | 
N. Baloian, G. Zurita | 
1833 | 
 
| An Application of the Dynamic Pattern Analysis Framework to the Analysis of Spatial-Temporal Crime Relationships | 
K. Leong, J. Li, S. Chan, V. Ng | 
1852 | 
 
| A QoS Perspective on Exception Diagnosis in Service-Oriented Computing | 
N. Shah, R. Iqbal, K. Iqbal, A. James | 
1871 | 
 
| Applying Reputation Mechanisms in Communities of Practice: A Case Study | 
C.C.P. Cruz, C.L.R. Motta, F.M. Santoro, M. Elia | 
1886 | 
 
| Application of Intelligent Strategies for Cooperative Manufacturing Planning | 
W. Li, L. Gao, X. Li | 
1907 | 
 
| Pattern-Oriented Workflow Generation and  Optimization | 
Y. Xiang, S. Zhang, Y. Shen, M. Shi | 
1924 | 
 
| Supporting Awareness in Groupware through an Aspect-Oriented Middleware Service | 
R.S.P. Maciel, J.M.N. David, M.R. Oei, A.A. de Oliveira Bastos, L. de Oliveira Menezes | 
1945 | 
 
| Integrating Semantic Web and Object-Oriented Programming for Cooperative Design | 
P.-H. Chiu, C.-C. Lo, K.-M. Chao | 
1970 | 
 
| Using Embodied Conversational Assistants to Interface Users with Multi-Agent Based CSCW Applications: The WebAnima Agent | 
E. Cabrera Paraiso, C.A. Tacla | 
1991 | 
 
| Transmission Latency based Network Friendly Tree for Peer-to-Peer Streaming | 
T. Peng, Q. Zheng, Y. Jin | 
2011 | 
 
 
Content of Issue 10
 DOI: 10.3217/jucs-015-10
 | 
 
| Information Integration on Web-based Applications and Services | 
G. Kotsis, D. Taniar, I. Khalil, E. Pardede | 
2026 | 
 
| Updates, Schema Updates and Validation of XML Documents - Using Abstract State Machines with Automata-Defined States | 
K.-D. Schewe, B. Thalheim, Q. Wang | 
2028 | 
 
| SQL/XML Hierarchical Query Performance Analysis in an XML-Enabled Database System | 
E. Pardede, J.W. Rahayu, R. Kaur Aujla, D. Taniar | 
2058 | 
 
| An Agent for Web-based Structured Hypermedia Algorithm Explanation System | 
E.M. Shakshuki, R. Halliday | 
2078 | 
 
| Application Framework with Demand-Driven Mashup for Selective Browsing | 
S. Ikeda, T. Nagamine, T. Kamada | 
2109 | 
 
 
Content of Issue 11
 DOI: 10.3217/jucs-015-11
 | 
 
| Software Components, Architectures and Reuse | 
C. Werner, F. Oquendo | 
2138 | 
 
| An Approach for Estimating Execution Time Probability Distributions of Component-based Real-Time Systems | 
R. Perrone, R. Macedo, G. Lima, V. Lima | 
2142 | 
 
| Distribution Pattern-driven Development of Service Architectures | 
R. Barrett, C. Pahl | 
2166 | 
 
| Checking Semantics Equivalence of MDA Transformations in Concurrent Systems | 
P. Barbosa, F. Ramalho, J. Figueiredo, A. Júnior, A. Costa, L. Gomes | 
2196 | 
 
| A Flexible Strategy-Based Model Comparison Approach: Bridging the Syntactic and Semantic Gap | 
K. Oliveira, K. Breitman, T. Oliveira | 
2225 | 
 
| Assessment of the Design Modularity and Stability of Multi-Agent System Product Lines | 
C. Nunes, U. Kulesza, C. Sant'Anna, I. Nunes, A. Garcia, C. Lucena | 
2254 | 
 
 
Content of Issue 12
 DOI: 10.3217/jucs-015-12
 | 
 
| Intelligent Environments and Services | 
T.-h. Kim, A. Kusiak, D. Taniar, D. Zhang | 
2284 | 
 
| Causality Join Query Processing for Data Streams via a Spatiotemporal Sliding Window | 
O. Kwon, K.-J. Li | 
2287 | 
 
| Meeting Warming-up: Detecting Common Interests and Conflicts among Participants before a Meeting | 
Z. Yu, Z. Yu, X. Zhou, D. Zhang, Y. Nakamura | 
2311 | 
 
| Service Conflict Management Framework  for Multi-user Inhabited Smart Home | 
C. Shin, W. Woo | 
2330 | 
 
| On the Personalization of Personal Networks - Service Provision Based on User Profiles | 
I.G. Nikolakopoulos, C.Z. Patrikakis, A. Cimmino, M. Bauer, H. Olesen | 
2353 | 
 
| Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears | 
H.-C. Chu, D.-J. Deng, H.-C. Chao, Y.-M. Huang | 
2373 | 
 
| A Joint Web Resource Recommendation Method based on Category Tree and Associate Graph | 
L. Weng, Y. Zhang, Y. Zhou, L.T. Yang, P. Tian, M. Zhong | 
2387 | 
 
| Mining Dynamic Databases using Probability-Based Incremental Association Rule Discovery Algorithm | 
R. Amornchewin, W. Kreesuradej | 
2409 | 
 
| Modeling of an Intelligent e-Consent System in a Healthcare Domain | 
C. Ruan, S.-S. Yeo | 
2429 | 
 
 
Content of Issue 13
 DOI: 10.3217/jucs-015-13
 | 
 
| Knowledge Management for Intelligent Systems | 
K.-H. Jo, N.T. Nguyen, E. Szczerbicki | 
2445 | 
 
| Interactive Genetic Algorithms with Individual Fitness Not Assigned by Human | 
D. Gong, X. Yao, J. Yuan | 
2446 | 
 
| Human Tracking based on Multiple View Homography | 
D.-W. Seo, H.-U. Chae, B.-W. Kim, W.-H. Choi, K.-H. Jo | 
2463 | 
 
| A Multiagent System for Hierarchical Control and Monitoring | 
V.V. Tan, D.-S. Yoo, J.-C. Shin, M.-J. Yi | 
2485 | 
 
| A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic over Vehicular Networks | 
C.-J. Huang, I.-F. Chen, K.-W. Hu, H.-Y. Shen, Y.-J. Chen, D.-X. Yang | 
2506 | 
 
| Splice Site Prediction using Support Vector Machines with Context-Sensitive Kernel Functions | 
Y. Chen, F. Liu, B. Vanschoenwinkel, B. Manderick | 
2528 | 
 
| A Hammerstein-Wiener Recurrent Neural Network with Frequency-Domain Eigensystem Realization Algorithm for Unknown System Identification | 
Y.-C. Chen, J.-S. Wang | 
2547 | 
 
| Online Detecting and Predicting Special Patterns over Financial Data Streams | 
T. Jiang, Y. Feng, B. Zhang | 
2566 | 
 
| Applications of Cerebellar Model Articulation Controllers to Intelligent Landing System | 
J.-G. Juang, C.-L. Lee | 
2586 | 
 
| A Comparison Between a Geometrical and an ANN Based Method for Retinal Bifurcation Points Extraction | 
V. Bevilacqua, L. Cariello, M. Giannini, G. Mastronardi, V. Santarcangelo, R. Scaramuzzi, A. Troccoli | 
2608 | 
 
| Rough Classification - New Approach and Applications | 
N.T. Nguyen | 
2622 | 
 
| On the Semantics and Verification of Normative Multi-Agent Systems | 
L. Aştefănoaei, M. Dastani, J.-J. Meyer, F.S. de Boer | 
2629 | 
 
| Extended Defeasible Reasoning for Common Goals in n-Person Argumentation Games | 
D.H. Pham, G. Governatori, S. Thakur | 
2653 | 
 
| Analyzing Cooperation in Iterative Social Network Design | 
G. Boella, L. van der Torre, S. Villata | 
2676 | 
 
| Interactive Learning of Independent Experts' Criteria for Rescue Simulations | 
T.-Q. Chu, A. Drogoul, A. Boucher, J.-D. Zucker | 
2701 | 
 
| A New Short-term Power Load Forecasting Model Based on Chaotic Time Series and SVM | 
D. Niu, Y. Wang, C. Duan, M. Xing | 
2726 | 
 
 
Content of Issue 14
 DOI: 10.3217/jucs-015-14
 | 
 
| Managing Editor's Column | 
H. Maurer | 
2746 | 
 
| Optimal Serverless Networks Attacks, Complexity and some Approximate Algorithms | 
C. Aguirre, R. Huerta, L. Tsimring | 
2747 | 
 
| Realtime LEGO Brick Image Retrieval with Cellular Automata | 
L. Botha, L. van Zijl, M. Hoffmann | 
2765 | 
 
A Web-Decision Support System based on Collaborative Filtering for Academic Orientation.   Case Study of the Spanish Secondary School. | 
E.J. Castellano, L. Martínez | 
2786 | 
 
| Petri Net Controlled Grammars: the Case of Special Petri Nets | 
J. Dassow, S. Turaev | 
2808 | 
 
| A Debugging System Based on Natural Semantics | 
A. de la Encina, L. Llana, F. Rubio | 
2836 | 
 
| Ideal Homogeneous Access Structures Constructed from Graphs | 
J. Herranz | 
2881 | 
 
| A Heuristic Approach for the Automatic Insertion of Checkpoints in Message-Passing Codes | 
G. Rodríguez, M.J. Martín, P. González, J. Touriño | 
2894 | 
 
 
Content of Issue 15
 DOI: 10.3217/jucs-015-15
 | 
 
| Security in Information Systems: New Advances and Tendencies | 
E. Fernández-Medina, A. Rodríguez | 
2912 | 
 
| SeAAS - A Reference Architecture for Security Services in SOA | 
M. Hafner, M. Memon, R. Breu | 
2916 | 
 
| Information Theoretically Secure Encryption with Almost Free Authentication | 
B. Alomair, R. Poovendran | 
2937 | 
 
| ModelSec: A Generative Architecture for Model-Driven Security | 
Ó. Sánchez, F. Molina, J. García-Molina, A. Toval | 
2957 | 
 
| Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers | 
P. Caballero-Gil, A. Fúster-Sabater, C. Hernández-Goya | 
2981 | 
 
| A User Controlled Approach for Securing Sensitive Information in Directory Services | 
W. Claycomb, D. Shin | 
2999 | 
 
| Optimizations for Risk-Aware Secure Supply Chain Master Planning | 
A. Schröpfer, F. Kerschbaum, C. Schütz, R. Pibernik | 
3019 | 
 
| Managing Security and its Maturity in Small and Medium-sized Enterprises | 
L.E. Sánchez, A. Santos-Olmo Parra, D.G. Rosado, M. Piattini | 
3038 | 
 
| A System for Managing Security Knowledge using Case Based Reasoning and Misuse Cases | 
C.A. Visaggio, F. de Rosa | 
3059 | 
 
 
Content of Issue 18
 DOI: 10.3217/jucs-015-18
 | 
 
| Processing Camera-Based Documents | 
R. Dueire Lins | 
3158 | 
 
| Layout Analysis for Camera-Based Whiteboard Notes | 
S. Vajda, T. Plötz, G.A. Fink | 
3307 | 
 
| Robust Extraction of Text from Camera Images using Colour and Spatial Information Simultaneously | 
S.P. Chowdhury, S. Dhar, K. Rafferty, A.K. Das, B. Chanda | 
3325 | 
 
| Adaptive Binarization of Unconstrained Hand-Held Camera-Captured Document Images | 
S.S. Bukhari, F. Shafait, T.M. Breuel | 
3343 | 
 
| Automatically Deciding if a Document was  Scanned or Photographed | 
G. Pereira e Silva, M. Thielo, R. Dueire Lins, B. Miro, S.J. Simske | 
3364 | 
 
 
 |