{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T16:20:22Z","timestamp":1773246022783,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Agence Nationale de la Recherche","award":["ANR-14-CE28-0022"],"award-info":[{"award-number":["ANR-14-CE28-0022"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2682571.2797059","type":"proceedings-article","created":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T13:41:11Z","timestamp":1441114871000},"page":"167-175","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["The Delaunay Document Layout Descriptor"],"prefix":"10.1145","author":[{"given":"S\u00e9bastien","family":"Eskenazi","sequence":"first","affiliation":[{"name":"Universit\u00e9 de La Rochelle, La Rochelle, France"}]},{"given":"Petra","family":"Gomez-Kr\u00e4mer","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de La Rochelle, La Rochelle, France"}]},{"given":"Jean-Marc","family":"Ogier","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de La Rochelle, La Rochelle, France"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494266.2494315"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.271"},{"key":"e_1_3_2_1_3_1","volume-title":"ANTS","author":"Doc ANTS.","year":"2013","unstructured":"ANTS. Sp\u00e9cifications techniques des Codes \u00e0 Barres 2D- Doc . Technical report , ANTS , 2013 . ANTS. Sp\u00e9cifications techniques des Codes \u00e0 Barres 2D-Doc. Technical report, ANTS, 2013."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(02)00227-3"},{"key":"e_1_3_2_1_5_1","volume-title":"Secure Hash Standard (SHS)","author":"Bryson J.","year":"2012","unstructured":"J. Bryson and P. Gallagher . Secure Hash Standard (SHS) , 2012 . J. Bryson and P. Gallagher. Secure Hash Standard (SHS), 2012."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/876867.877702"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84628-726-8","volume-title":"Digital document processing. major directions and recent advances","author":"Chaudhuri B. B.","year":"2007","unstructured":"B. B. Chaudhuri . Digital document processing. major directions and recent advances . Springer , 2007 . B. B. Chaudhuri. Digital document processing. major directions and recent advances. Springer, 2007."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.194"},{"key":"e_1_3_2_1_9_1","first-page":"111","volume-title":"International Journal on Document Analysis and Recognition (IJDAR)","author":"Co\u00fcasnon B.","year":"2006","unstructured":"B. Co\u00fcasnon . DMOS , a generic document recognition method: application to table structure analysis in a general and in a specific way . In International Journal on Document Analysis and Recognition (IJDAR) , volume 8 , pages 111 -- 122 . Springer-Verlag , 2006 . B. Co\u00fcasnon. DMOS, a generic document recognition method: application to table structure analysis in a general and in a specific way. In International Journal on Document Analysis and Recognition (IJDAR), volume 8, pages 111--122. Springer-Verlag, 2006."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.946985"},{"key":"e_1_3_2_1_11_1","volume-title":"Multistrategy learning for document recognition. Applied Artificial Intelligence an International Journal, 8(1):33--84","author":"Esposito F.","year":"1994","unstructured":"F. Esposito , D. Malerba , and G. Semeraro . Multistrategy learning for document recognition. Applied Artificial Intelligence an International Journal, 8(1):33--84 , 1994 . F. Esposito, D. Malerba, and G. Semeraro. Multistrategy learning for document recognition. Applied Artificial Intelligence an International Journal, 8(1):33--84, 1994."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2009.110"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1993.395633"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.959135"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.1998.0684"},{"key":"e_1_3_2_1_16_1","first-page":"340","volume-title":"Proc. of 4th Canadian Conference on Computational Geometry","author":"Leach G.","year":"1992","unstructured":"G. Leach and G. Leach . Improving worst-case optimal Delaunay triangulation algorithms . In Proc. of 4th Canadian Conference on Computational Geometry , pages 340 -- 346 , 1992 . G. Leach and G. Leach. Improving worst-case optimal Delaunay triangulation algorithms. In Proc. of 4th Canadian Conference on Computational Geometry, pages 340--346, 1992."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/839291.842783"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11669487_48"},{"key":"e_1_3_2_1_20_1","volume-title":"Internet activities board","author":"Rivest R.","year":"1992","unstructured":"R. Rivest . The MD5 message-digest algorithm. Technical report , Internet activities board , 1992 . R. Rivest. The MD5 message-digest algorithm. Technical report, Internet activities board, 1992."}],"event":{"name":"DocEng '15: ACM Symposium on Document Engineering 2015","location":"Lausanne Switzerland","acronym":"DocEng '15","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 2015 ACM Symposium on Document Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2682571.2797059","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2682571.2797059","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:07Z","timestamp":1750277647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2682571.2797059"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":19,"alternative-id":["10.1145\/2682571.2797059","10.1145\/2682571"],"URL":"https:\/\/doi.org\/10.1145\/2682571.2797059","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}