{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:48Z","timestamp":1750306968368,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,9,10]],"date-time":"2013-09-10T00:00:00Z","timestamp":1378771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,9,10]]},"DOI":"10.1145\/2494266.2494318","type":"proceedings-article","created":{"date-parts":[[2013,9,3]],"date-time":"2013-09-03T11:57:17Z","timestamp":1378209437000},"page":"127-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Evaluating glyph binarizations based on their properties"],"prefix":"10.1145","author":[{"given":"Shira","family":"Faigenbaum","sequence":"first","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Arie","family":"Shaus","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Barak","family":"Sober","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Eli","family":"Turkel","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Eli","family":"Piasetzky","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]}],"member":"320","published-online":{"date-parts":[[2013,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.246"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2010.118"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2011.299"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815330.1815334"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2012.32"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2012.70"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAS.2008.41"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2012.2219550"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037342.2037372"},{"issue":"18","key":"e_1_3_2_1_10_1","first-page":"3011","article-title":"An evaluation technique for binarization algorithms","volume":"14","author":"Stathis P.","year":"2009","journal-title":"J. of Universal Computer Science"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2010.119"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.476511"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.368197"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/876867.877732"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.506792"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICFHR.2012.187"},{"volume-title":"Proc. of CVPR '10","author":"Epshtein B.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1568296.1568302"},{"key":"e_1_3_2_1_19_1","unstructured":"Aharoni Y. 1981. Arad Inscriptions. Israel Exploration Society.  Aharoni Y. 1981. Arad Inscriptions. Israel Exploration Society."},{"key":"e_1_3_2_1_20_1","article-title":"Lachish I: The Lachish","author":"Torczyner H.","year":"1938","journal-title":"Letters. London."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"volume-title":"Proc. of ICPR '86","year":"1986","author":"Bernsen J.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","unstructured":"Niblack W. 1986. An Introduction to Digital Image Processing. Prentice-Hall 115--116.   Niblack W. 1986. An Introduction to Digital Image Processing. Prentice-Hall 115--116."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00055-2"},{"key":"e_1_3_2_1_25_1","unstructured":"Tree model R version 2.12.2. http:\/\/www.r-project.org  Tree model R version 2.12.2. http:\/\/www.r-project.org"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/30.1-2.81"}],"event":{"name":"DocEng '13: ACM Symposium on Document Engineering 2013","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Florence Italy","acronym":"DocEng '13"},"container-title":["Proceedings of the 2013 ACM symposium on Document engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2494266.2494318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2494266.2494318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:22Z","timestamp":1750235962000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2494266.2494318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,10]]},"references-count":26,"alternative-id":["10.1145\/2494266.2494318","10.1145\/2494266"],"URL":"https:\/\/doi.org\/10.1145\/2494266.2494318","relation":{},"subject":[],"published":{"date-parts":[[2013,9,10]]},"assertion":[{"value":"2013-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}