Proceedings of the 2012 ACM Symposium on Document Engineering 2012
DOI: 10.1145/2361354.2361363
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in generating bookmarks from TOC entries in e-books

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Third, we harvest title and authors from Google Books through its API using ISBN search 14 , which we believe is the best source of ISBN data. Querying using the 4905 ISBNs other well known sources, including Abebooks 15 , Amazon book 16 , ISBNSearch 17 , and BookFinder4U 18 , we retrieved 814, 1275, 1170, 1301 books respectively while Google Books returned 4329 books with valid title and authors and which covered all others.…”
Section: Metadata Extractionmentioning
confidence: 99%
See 2 more Smart Citations
“…Third, we harvest title and authors from Google Books through its API using ISBN search 14 , which we believe is the best source of ISBN data. Querying using the 4905 ISBNs other well known sources, including Abebooks 15 , Amazon book 16 , ISBNSearch 17 , and BookFinder4U 18 , we retrieved 814, 1275, 1170, 1301 books respectively while Google Books returned 4329 books with valid title and authors and which covered all others.…”
Section: Metadata Extractionmentioning
confidence: 99%
“…In general, to effectively extract the ToC from a document, three sub-tasks need to be addressed: ToC detection, parsing and linking [14,23]. ToC detection attempts to locate the boundary of the ToC, usually based on explicit heuristics.…”
Section: Table Of Contents Extractionmentioning
confidence: 99%
See 1 more Smart Citation
“…Organizational elements such as section headers and the ToC have been extracted using either a stand-alone rule-based method or in combination with machine learning. Ramanathan et al [226] presented an approach based only on rules and regular expressions to identify ToC entries. Wu et al [293] applied rules for entry detection according to three different ToC styles, as shown in Figure 2.7.…”
Section: Methodsmentioning
confidence: 99%
“…Fang et al [93] x x x Kruit et al [159] x x Gao et al [110] x x x Gao et al [108] x x x x x Ramanathan et al [226] x x x Wu et al [293] x x x Tkaczyk et al [265] x x x x x Wu et al [290] x x x x x Bast & Korzen [26] x x x x Tuarob et al [269,270] x x x x Larrañaga et al [165] x x Wali et al [280] x Lopes et al [171,172] x Dwarakanath et al [82] x Wang et al [284,285] x x Mihalcea & Csomai [195] x x Medelyan et al [189] x x Milne & Witten [197] x x Mendes et al [192] / Daiber et al [63] x x Moro et al [204] x x Zhu & Iglesias [302] x x Aghaebrahimian & Cielieback [5] x x…”
Section: Approachesmentioning
confidence: 99%