{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:13Z","timestamp":1750306573729,"version":"3.41.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T00:00:00Z","timestamp":1418947200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004731","name":"Natural Science Foundation of Zhejiang Province","doi-asserted-by":"publisher","award":["LY13F020008, LY12F02005"],"award-info":[{"award-number":["LY13F020008, LY12F02005"]}],"id":[{"id":"10.13039\/501100004731","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2013CB329102"],"award-info":[{"award-number":["2013CB329102"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007567","name":"City University of Hong Kong","doi-asserted-by":"publisher","award":["9667095"],"award-info":[{"award-number":["9667095"]}],"id":[{"id":"10.13039\/100007567","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005272","name":"National Center for International Joint Research on E-Business Information Processing","doi-asserted-by":"publisher","award":["2013B01035"],"award-info":[{"award-number":["2013B01035"]}],"id":[{"id":"10.13039\/501100005272","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61003074, 61272188"],"award-info":[{"award-number":["61003074, 61272188"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science & Technology Innovative Team of Zhejiang Province","award":["2012R10041-06"],"award-info":[{"award-number":["2012R10041-06"]}]},{"DOI":"10.13039\/501100002766","name":"Beijing University of Posts and Telecommunications","doi-asserted-by":"publisher","award":["SKLNST-2013-1-14"],"award-info":[{"award-number":["SKLNST-2013-1-14"]}],"id":[{"id":"10.13039\/501100002766","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Ministry of Education of Humanities and Social Sciences Project","award":["14YJCZH235"],"award-info":[{"award-number":["14YJCZH235"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Transactions on Asian Language Information Processing"],"published-print":{"date-parts":[[2014,12,19]]},"abstract":"<jats:p>\n            Ancient language manuscripts constitute a key part of the cultural heritage of mankind. As one of the most important languages, Chinese historical calligraphy work has contributed to not only the Chinese cultural heritage but also the world civilization at large, especially for Asia. To support deeper and more convenient appreciation of Chinese calligraphy works, based on our previous work on the probabilistic retrieval of historical Chinese calligraphic character manuscripts repositories, we propose a system framework of the multi-feature-based Chinese calligraphic character images probabilistic retrieval in the mobile cloud network environment, which is called the\n            <jats:italic>DPRC<\/jats:italic>\n            . To ensure retrieval efficiency, we further propose four enabling techniques: (1) DRL-based probability propagation, (2) optimal data placement scheme, (3) adaptive data robust transmission algorithm, and (4) index support filtering scheme. Comprehensive experiments are conducted to testify the effectiveness and efficiency of our proposed\n            <jats:italic>DPRC<\/jats:italic>\n            method.\n          <\/jats:p>","DOI":"10.1145\/2629575","type":"journal-article","created":{"date-parts":[[2014,12,22]],"date-time":"2014-12-22T13:53:23Z","timestamp":1419256403000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Personalized Probabilistic Retrieval of Chinese Calligraphic Manuscript Images in Mobile Cloud Environment"],"prefix":"10.1145","volume":"13","author":[{"given":"Yi","family":"Zhuang","sequence":"first","affiliation":[{"name":"Zhejiang Gongshang University, P.R. China"}]},{"given":"Qing","family":"Li","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, HKSAR"}]},{"given":"Dickson K. W.","family":"Chiu","sequence":"additional","affiliation":[{"name":"University of Hong Kong, HKSAR"}]},{"given":"Zhiang","family":"Wu","sequence":"additional","affiliation":[{"name":"Nanjing University of Economic and Finance, P.R. China"}]},{"given":"Haiyang","family":"Hu","sequence":"additional","affiliation":[{"name":"Hangzhou Dianzi University, P.R. China"}]}],"member":"320","published-online":{"date-parts":[[2014,12,19]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8191(02)00094-7"},{"key":"e_1_2_1_2_1","unstructured":"Amazon EC2. 2009. http:\/\/aws.amazon.com\/ec2\/.  Amazon EC2. 2009. http:\/\/aws.amazon.com\/ec2\/."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037342.2037347"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.993558"},{"volume-title":"Proceedings of the International Conference on Data Engineering. 577--588","author":"Berchtold S.","key":"e_1_2_1_5_1","unstructured":"Berchtold , S. , B\u00f6hm , C. , Jagadish , H. V. , Kriegel , H.-P. , and Sander , J . 2000. Independent quantization: An index compression technique for high-dimensional data spaces . In Proceedings of the International Conference on Data Engineering. 577--588 . Berchtold, S., B\u00f6hm, C., Jagadish, H. V., Kriegel, H.-P., and Sander, J. 2000. Independent quantization: An index compression technique for high-dimensional data spaces. In Proceedings of the International Conference on Data Engineering. 577--588."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/502807.502809"},{"key":"e_1_2_1_7_1","unstructured":"CADAL. 2010. The CADAL Project. www.cadal.zju.edu.cn.  CADAL. 2010. The CADAL Project. www.cadal.zju.edu.cn."},{"key":"e_1_2_1_8_1","first-page":"691","article-title":"A strategic decomposition for adaptive image transmission","volume":"24","author":"Chang R.-C.","year":"2008","unstructured":"Chang , R.-C. , Shih , T. K. and Hsu , H.-H. 2008 . A strategic decomposition for adaptive image transmission . J. Inf. Sci. Eng. 24 , 3, 691 -- 707 . Chang, R.-C., Shih, T. K. and Hsu, H.-H. 2008. A strategic decomposition for adaptive image transmission. J. Inf. Sci. Eng. 24, 3, 691--707.","journal-title":"J. Inf. Sci. Eng."},{"volume-title":"Proceedings of the Asia-Pacific Conference on Communications and 4th Optoelectronics and Communications Conference, 2, 892--895","author":"Chang C. C.","key":"e_1_2_1_9_1","unstructured":"Chang , C. C. , Shine , F. C. , and Chen , T. S ., 1999. A new scheme of progressive image transmission based on bit-plane method . In Proceedings of the Asia-Pacific Conference on Communications and 4th Optoelectronics and Communications Conference, 2, 892--895 . Chang, C. C., Shine, F. C., and Chen, T. S., 1999. A new scheme of progressive image transmission based on bit-plane method. In Proceedings of the Asia-Pacific Conference on Communications and 4th Optoelectronics and Communications Conference, 2, 892--895."},{"key":"e_1_2_1_10_1","first-page":"341","article-title":"An efficient progressive image transmission method based on guessing by neighbors","volume":"18","author":"Chang C. C.","year":"2002","unstructured":"Chang , C. C. , Shih , T. K. , and Lin , I. C. , 2002 . An efficient progressive image transmission method based on guessing by neighbors . Visual Computer: Int. J. Computer Graph. 18 , 341 -- 353 . Chang, C. C., Shih, T. K., and Lin, I. C., 2002. An efficient progressive image transmission method based on guessing by neighbors. Visual Computer: Int. J. Computer Graph. 18, 341--353.","journal-title":"Visual Computer: Int. J. Computer Graph."},{"key":"e_1_2_1_11_1","first-page":"1774","article-title":"A color image progressive transmission method by common bit map block truncation coding approach","volume":"2","author":"Chang C. C.","year":"2003","unstructured":"Chang , C. C. and Wu , M. N. 2003 . A color image progressive transmission method by common bit map block truncation coding approach . In Proceedings of the International Conference on Communication Technology , 2 , 1774 -- 1778 . Chang, C. C. and Wu, M. N. 2003. A color image progressive transmission method by common bit map block truncation coding approach. In Proceedings of the International Conference on Communication Technology, 2, 1774--1778.","journal-title":"Proceedings of the International Conference on Communication Technology"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/144179.144296"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1077-3142(03)00009-2"},{"volume-title":"Proceedings of the IEEE International Conference on Computer Vision. 173--187","author":"Cohen S.","key":"e_1_2_1_14_1","unstructured":"Cohen , S. and Guibas , L . 1999. The earth mover\u2019s distance under transformation sets . In Proceedings of the IEEE International Conference on Computer Vision. 173--187 . Cohen, S. and Guibas, L. 1999. The earth mover\u2019s distance under transformation sets. In Proceedings of the IEEE International Conference on Computer Vision. 173--187."},{"key":"e_1_2_1_15_1","unstructured":"Cormen T. H. Leiserson C. E. Rivest R. L. and Stein C. 2009. Introduction to Algorithms 3rd Ed. MIT Press.   Cormen T. H. Leiserson C. E. Rivest R. L. and Stein C. 2009. Introduction to Algorithms 3rd Ed. MIT Press."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/217279.215287"},{"volume-title":"Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 226--231","author":"Ester M.","key":"e_1_2_1_17_1","unstructured":"Ester , M. , Kriegel , H.-P. , Sander , J. , and Xu , X . -W. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise . In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 226--231 . Ester, M., Kriegel, H.-P., Sander, J., and Xu, X.-W. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 226--231."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1136800"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881227.1881277"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/645483.656224"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071610.1071612"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:19960254"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/99935.99949"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.849776"},{"volume-title":"Proceedings of the International Conference on Document Analysis and Recognition.","author":"Nakagawa M.","key":"e_1_2_1_26_1","unstructured":"Nakagawa , M. and Onuma , M . 2003. On-line handwritten japanese text recognition free from constrains on line direction and character orientation . In Proceedings of the International Conference on Document Analysis and Recognition. Nakagawa, M. and Onuma, M. 2003. On-line handwritten japanese text recognition free from constrains on line direction and character orientation. In Proceedings of the International Conference on Document Analysis and Recognition."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090176.2090177"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.824821"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2011.218"},{"volume-title":"Proceedings of the Annual International Conference on Network Protocols. 209--219","author":"Raman S.","key":"e_1_2_1_30_1","unstructured":"Raman , S. , Balakrishnan , H. , and Srinivasan , M . 2000. An image transport protocol for the Internet . In Proceedings of the Annual International Conference on Network Protocols. 209--219 . Raman, S., Balakrishnan, H., and Srinivasan, M. 2000. An image transport protocol for the Internet. In Proceedings of the Annual International Conference on Network Protocols. 209--219."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009056"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/582318.582321"},{"volume-title":"Proceedings of the19th IASTED International Conference on Applied Informatics: Advances in Computer Applications. 519--524","author":"Ruiz V. G","key":"e_1_2_1_33_1","unstructured":"Ruiz , V. G , Fern\u00e1ndez , J.-J. , and Garc\u00eda , I . 2001. Image compression for progressive transmission . In Proceedings of the19th IASTED International Conference on Applied Informatics: Advances in Computer Applications. 519--524 . Ruiz, V. G, Fern\u00e1ndez, J.-J., and Garc\u00eda, I. 2001. Image compression for progressive transmission. In Proceedings of the19th IASTED International Conference on Applied Informatics: Advances in Computer Applications. 519--524."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.263"},{"key":"e_1_2_1_35_1","first-page":"1336","article-title":"Content Based Chinese Script Retrieval through Visual Similarity Criteria","volume":"12","author":"Shi B. L.","year":"2001","unstructured":"Shi , B. L. , Zhang , L. , Wang , Y. , and Chen , Z. F. 2001 . Content Based Chinese Script Retrieval through Visual Similarity Criteria . Chinese J. Software 12 , 9, 1336 -- 1342 . Shi, B. L., Zhang, L., Wang, Y., and Chen, Z. F. 2001. Content Based Chinese Script Retrieval through Visual Similarity Criteria. Chinese J. Software 12, 9, 1336--1342.","journal-title":"Chinese J. Software"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1117\/12.7974121"},{"key":"e_1_2_1_37_1","unstructured":"Wiki. 2010. http:\/\/en.wikipedia.org\/wiki\/Chinese_calligraphy.  Wiki. 2010. http:\/\/en.wikipedia.org\/wiki\/Chinese_calligraphy."},{"key":"e_1_2_1_38_1","unstructured":"Wu Y.-S. and Ding X. Q. 1992. Chinese character recognition: The principles and the implementations. High Education Press Beijing.  Wu Y.-S. and Ding X. Q. 1992. Chinese character recognition: The principles and the implementations. High Education Press Beijing."},{"volume-title":"Proceedings of the 24th International Conference on Very Large Data Bases. 194--205","author":"Weber R.","key":"e_1_2_1_39_1","unstructured":"Weber , R. , Schek , H. , and Blott , S . 1998. A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces . In Proceedings of the 24th International Conference on Very Large Data Bases. 194--205 . Weber, R., Schek, H., and Blott, S. 1998. A quantitative analysis and performance study for similarity-search methods in high-dimensional spaces. In Proceedings of the 24th International Conference on Very Large Data Bases. 194--205."},{"volume-title":"Proceedings of the 1st International Workshop on Document Image Analysis for Libraries. 299--305","author":"Yosef I. B.","key":"e_1_2_1_40_1","unstructured":"Yosef , I. B. , Kedem , K. , Dinstein , I. , Beit-Arie , M. , and Engel , E . 2004. Classification of Hebrew calligraphic handwriting styles: Preliminary results . In Proceedings of the 1st International Workshop on Document Image Analysis for Libraries. 299--305 . Yosef, I. B., Kedem, K., Dinstein, I., Beit-Arie, M., and Engel, E. 2004. Classification of Hebrew calligraphic handwriting styles: Preliminary results. In Proceedings of the 1st International Workshop on Document Image Analysis for Libraries. 299--305."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.70734"},{"volume-title":"Chinese Character Recognition Techniques","author":"Zhang X. Z.","key":"e_1_2_1_42_1","unstructured":"Zhang , X. Z. 1992. Chinese Character Recognition Techniques . Tsinghua University Press , Beijing . Zhang, X. Z. 1992. Chinese Character Recognition Techniques. Tsinghua University Press, Beijing."},{"volume-title":"Proceedings of the 9th International Conference on Document Analysis and Recognition. 48--52","author":"Zhou X. D.","key":"e_1_2_1_43_1","unstructured":"Zhou , X. D. , Yu , J. L. , Liu , C. L. , Nagasaki , T. , and Marukawa , K .. 2007. Online handwritten Japanese character string recognition incorporating geometric context . In Proceedings of the 9th International Conference on Document Analysis and Recognition. 48--52 . Zhou, X. D., Yu, J. L., Liu, C. L., Nagasaki, T., and Marukawa, K.. 2007. Online handwritten Japanese character string recognition incorporating geometric context. In Proceedings of the 9th International Conference on Document Analysis and Recognition. 48--52."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282080.1282083"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1997305.1997335"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30541-5_3"}],"container-title":["ACM Transactions on Asian Language Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629575","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2629575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:29Z","timestamp":1750227209000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2629575"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,19]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,12,19]]}},"alternative-id":["10.1145\/2629575"],"URL":"https:\/\/doi.org\/10.1145\/2629575","relation":{},"ISSN":["1530-0226","1558-3430"],"issn-type":[{"type":"print","value":"1530-0226"},{"type":"electronic","value":"1558-3430"}],"subject":[],"published":{"date-parts":[[2014,12,19]]},"assertion":[{"value":"2013-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-12-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}