{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:55:42Z","timestamp":1770220542751,"version":"3.49.0"},"publisher-location":"Dordrecht","reference-count":18,"publisher":"Springer Netherlands","isbn-type":[{"value":"9789401044530","type":"print"},{"value":"9789401110402","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/978-94-011-1040-2_32","type":"book-chapter","created":{"date-parts":[[2011,8,9]],"date-time":"2011-08-09T18:33:21Z","timestamp":1312914801000},"page":"249-256","source":"Crossref","is-referenced-by-count":14,"title":["An Evaluation of Priority Queues for Mathematical Morphology"],"prefix":"10.1007","author":[{"given":"Edmond J.","family":"Breen","sequence":"first","affiliation":[]},{"given":"David H.","family":"Monro","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/34.295913","volume-title":"\u2018Seeded region growing\u2019","author":"R Adams","year":"1994","unstructured":"Adams, R. & Bischof, L. (1994), \u2018Seeded region growing\u2019, IEEE Transactions on Pattern Analysis and Machine Intelligence."},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1002\/spe.4380230403","volume":"23","author":"J Bell","year":"1993","unstructured":"Bell, J. & Gupta, G. (1993), \u2018An evaluation of self\u2014adjusting binary search tree techniques\u2019, Software Practice and Experience 23, 369\u2013382.","journal-title":"Software Practice and Experience"},{"key":"32_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/0169-2607(92)90089-P","volume":"37","author":"E Breen","year":"1992","unstructured":"Breen, E., Joss, G. & Williams, K. (1992), \u2018Dynamic arrays for fast, efficient, data manipulation during image analysis: a new software tool for exploratory data analysis\u2019, Computer Methods and Programs in Biomedicine 37, 85\u201392.","journal-title":"Computer Methods and Programs in Biomedicine"},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1145\/28869.28874","volume":"34","author":"ML Fredman","year":"1987","unstructured":"Fredman, M. L. & Tarjan, R. E. (1987), \u2018Fibonacci heaps and their uses in improved network optimization algorithms\u2019, J. Assoc. Comp. Mach. 34, 596\u2013615.","journal-title":"J. Assoc. Comp. Mach."},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1145\/5684.5686","volume":"29","author":"DW Jones","year":"1986","unstructured":"Jones, D. W. (1986), \u2018An empirical comparison of priority\u2014queue and event\u2014set implementations\u2019, Communications of the ACM 29, 300\u2013311.","journal-title":"Communications of the ACM"},{"key":"32_CR6","volume-title":"Algorithms and data structures: design, correctness, analysis","author":"JH Kingston","year":"1990","unstructured":"Kingston, J. H. (1990), Algorithms and data structures: design, correctness, analysis, International Computer Science, Addison-Wesley, Sydney."},{"key":"32_CR7","unstructured":"Knuth, D. (1973), The art of computer programming. Volume 3: Sorting and searching, Addison-Wesley."},{"key":"32_CR8","volume-title":"Technical Report N06\/90\/MM","author":"F Meyer","year":"1991","unstructured":"Meyer, F. (1991), Algorithmes ordonn\u00e9s de ligne de partage des eaux, Technical Report N06\/90\/MM, Ecole des Mines de Paris, Centre de Morphologie Math\u00e9matique."},{"key":"32_CR9","unstructured":"Serra, J. (1982), Image Analysis and Mathematical Morphology, Academic Press."},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"652","DOI":"10.1145\/3828.3835","volume":"32","author":"DD Sleator","year":"1985","unstructured":"Sleator, D. D. & Tarjan, R. E. (1985), \u2018Self\u2014adjusting binary search trees\u2019, J. Assoc. Comp. Mach. 32, 652\u2013686.","journal-title":"J. Assoc. Comp. Mach."},{"key":"32_CR11","series-title":"Lausanne","first-page":"240","volume-title":"\u2018Visual Communications and Image Processing\u201990\u2019","author":"P Soille","year":"1990","unstructured":"Soille, P. & Vincent, L. (1990), Determining watersheds in digital pictures via flooding simulations, in \u2018Visual Communications and Image Processing\u201990\u2019, Lausanne, pp. 240\u2013250."},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/0165-1684(89)90031-5","volume":"16","author":"L Vincent","year":"1989","unstructured":"Vincent, L. (1989), \u2018Graphs and mathematical morphology\u2019, Signal Processing 16, 365\u2013388.","journal-title":"Signal Processing"},{"key":"32_CR13","volume-title":"\u2018Medical Imaging V\u2019","author":"L Vincent","year":"1991a","unstructured":"Vincent, L. (1991a), Efficient computation of various types of skeletons, in \u2018Medical Imaging V\u2019."},{"key":"32_CR14","first-page":"158","volume-title":"\u2018Nonlinear Image Processing II\u2019","author":"L Vincent","year":"1991b","unstructured":"Vincent, L. (1991b), New trends in morphological algorithms, in \u2018Nonlinear Image Processing II\u2019, pp. 158\u2013170."},{"key":"32_CR15","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1109\/CVPR.1992.223122","volume-title":"Proc. IEEE Computer Vision and Pattern Recognition\u201992\u2019","author":"L Vincent","year":"1992","unstructured":"Vincent, L. (1992), Morphological grayscale reconstruction: definition, efficient algorithm and applications in image analysis, in Proc. IEEE Computer Vision and Pattern Recognition\u201992\u2019, Champaign IL, pp. 633\u2013635."},{"key":"32_CR16","first-page":"22","volume-title":"\u2018Mathematical Morphology and its applications to signal processing\u2019","author":"L Vincent","year":"1993","unstructured":"Vincent, L. (1993), Grayscale area openings and closings, their efficient implementation and applications, in J. Serra & P. Salembier, eds, \u2018Mathematical Morphology and its applications to signal processing\u2019, UPC Publications, pp. 22\u201327."},{"issue":"6","key":"32_CR17","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1109\/34.87344","volume":"13","author":"L Vincent","year":"1991","unstructured":"Vincent, L. & Soille, P. (1991), \u2018Watersheds in digital spaces: an efficient algorithm based on immersion simulations\u2019, IEEE Transactions on Pattern Analysis and Machine Intelligence 13(6), 583\u2013598.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"32_CR18","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1145\/512274.512284","volume":"7","author":"JWJ Williams","year":"1964","unstructured":"Williams, J. W. J. (1964), \u2018Algorithm 232: Heapsort\u2019, Communications of the ACM 7, 347\u2013348.","journal-title":"Communications of the ACM"}],"container-title":["Computational Imaging and Vision","Mathematical Morphology and Its Applications to Image Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-94-011-1040-2_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T02:31:52Z","timestamp":1638239512000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-94-011-1040-2_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9789401044530","9789401110402"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-94-011-1040-2_32","relation":{},"ISSN":["1381-6446"],"issn-type":[{"value":"1381-6446","type":"print"}],"subject":[],"published":{"date-parts":[[1994]]}}}