{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:54:01Z","timestamp":1725468841324},"reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387342238"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-34224-9_11","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T14:54:56Z","timestamp":1156517696000},"page":"86-97","source":"Crossref","is-referenced-by-count":5,"title":["Learning context models for the recognition of scenarios"],"prefix":"10.1007","author":[{"given":"Sofia","family":"Zaidenberg","sequence":"first","affiliation":[]},{"given":"Oliver","family":"Brdiczka","sequence":"additional","affiliation":[]},{"given":"Patrick","family":"Reignier","sequence":"additional","affiliation":[]},{"given":"James","family":"Crowley","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","unstructured":"R. Bodor, B. Jackson and N. Papanikolopoulos, \u201cVision-Based Human Tracking and Activity Recognition\u201d, in \u2018Proc. of the 11th Med. Conf. on Control and Automation\u2019, 2003."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"J.L. Crowley, J. Coutaz, G. Rey and P. Reigner, \u201cPerceptual components for context awareness\u201d, in \u2018International conference on ubiquitous computing\u201d, 2002.","DOI":"10.1007\/3-540-45809-3_9"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Y.A. Ivanov and A.F. Bobick, \u201cRecognition of Visual Activities and Interactions by Stochastic Parsing\u201d, in \u2018IEEE Trans. on Pattern Analysis and Machine Intelligence\u2019, 2000.","DOI":"10.1109\/34.868686"},{"key":"11_CR4","unstructured":"P. Lichodzijewski, A. Zincir-Heywood and M. Heywood, \u201cDynamic Intrusion Detection Using Self Organizing Maps\u201d, in \u201814th ACITSS\u2019, 2002."},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"G. Ma and X. Lin, \u201cTypical Sequences Extraction and Recognition\u201d, in, Computer Vision in HCI: ECCV 2004 Workshop on HCI, Prague, Czech Republic, 2004.","DOI":"10.1007\/978-3-540-24837-8_7"},{"key":"11_CR6","unstructured":"D. Mahajan, N. Kwatra, S, Jain, P. Kalra and S. Banerjee, \u201cA Framework for Activity Recognition and Detection of Unusual Activities\u201d, in \u2018ICCVGIP\u2019, 2004."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"I. McCowan, D. Gatica-Perez, S. Bengio, G. Lathoud, M. Barnard and D. Zhang, \u201cAutomatic Analysis of Multimodal Group Actions in Meetings\u201d, in \u2018IEEE Trans. PAMI\u2019, 2005.","DOI":"10.1109\/TPAMI.2005.49"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"D. Minnen, I. Essa and T. Starner, \u201cExpectation grammars; leveraging high-level expectations for activity recognition\u201d, in \u2018CVPR\u2019, 2003.","DOI":"10.1109\/CVPR.2003.1211525"},{"key":"11_CR9","unstructured":"D. Moore and I. Essa, \u201cRecognizing multitasked activities using stochastic context-free grammar\u2019, in \u2018CVPR Workshop on Models vs Exemplars in Computer Vision\u2019, 2001."},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"L.R. Rabiner, \u201cA Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition\u2019, in A. Waibel & K.-F. Lee, ed., \u2018Readings in Speech Recognition\u2019, 1990.","DOI":"10.1016\/B978-0-08-051584-7.50027-9"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"G. Schwarz, \u201cEstimating the dimension of a model\u201d, in \u2018Ann. Statist\u2019, pp. 461\u2013464, 1978.","DOI":"10.1214\/aos\/1176344136"},{"key":"11_CR12","unstructured":"Y. Shi, Y. Huang, D. Minnen, A.F. Bobick and LA, Essa, \u201cPropagation Networks for Recognition of Partially Ordered Sequential Action\u201d, in \u2018CVPR (2)\u2019, 2004."},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"N. Vaswani, A.R. Chowdhury and R. Chellappa, \u201cActivity recognition using the dynamics of the configuration of interacting objects\u201d, in \u2018CVPR\u2019, 2003.","DOI":"10.1109\/CVPR.2003.1211526"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"D. Zhang, D. Gatica-Perez, S. Bengio, I. McCowan and G. Lathoud, \u201cMultimodal Group Action Clustering in Meetings\u201d, in \u2018ACM 2nd Intern. Workshop on Video Surveillance and Sensor Networks in conj. with 12th ACM International Conference on Multimedia\u2019, 2004.","DOI":"10.1145\/1026799.1026810"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"H. Zhong, J. Shi and M. Visontai, \u201cDetecting Unusual Activity in Video\u201d, \u2018CVPR\u2019, 2004.","DOI":"10.1109\/CVPR.2004.1315249"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"M. Zimmermann and H. Bunke, \u201cHidden Markov Model Length Optimization for Handwriting Recognition Systems\u201d, in \u2018IWFHR\u201d, 2002.","DOI":"10.1109\/IWFHR.2002.1030938"}],"container-title":["IFIP International Federation for Information Processing","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-34224-9_11.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:17Z","timestamp":1605644297000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-34224-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387342238"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/0-387-34224-9_11","relation":{},"subject":[]}}