{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T05:11:08Z","timestamp":1736140268248,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540307501"},{"type":"electronic","value":"9783540322849"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11595755_45","type":"book-chapter","created":{"date-parts":[[2005,11,28]],"date-time":"2005-11-28T12:01:10Z","timestamp":1133179270000},"page":"371-379","source":"Crossref","is-referenced-by-count":1,"title":["Recognition of Complex Human Behaviors in Pool Environment Using Foreground Silhouette"],"prefix":"10.1007","author":[{"given":"How-Lung","family":"Eng","sequence":"first","affiliation":[]},{"given":"Kar-Ann","family":"Toh","sequence":"additional","affiliation":[]},{"given":"Wei-Yun","family":"Yau","sequence":"additional","affiliation":[]},{"given":"Tuan-Kiang","family":"Chiew","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"45_CR1","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/6979.880969","volume":"1","author":"R. Cucchiara","year":"2000","unstructured":"Cucchiara, R., Piccardi, M., Mello, P.: Image analysis and rule-based reasoning for a traffic monitoring system. IEEE Trans. Intelligent Transportation Systems\u00a01, 119\u2013130 (2000)","journal-title":"IEEE Trans. Intelligent Transportation Systems"},{"key":"45_CR2","first-page":"276","volume":"30","author":"M.C. Su","year":"2000","unstructured":"Su, M.C.: A fuzzy rule-based approach to spatio-temporal hand gesture recognition. IEEE Trans. Syst., Man and Cybernetics, Part C\u00a030, 276\u2013281 (2000)","journal-title":"IEEE Trans. Syst., Man and Cybernetics, Part C"},{"key":"45_CR3","doi-asserted-by":"crossref","unstructured":"Yamato, J., Ohya, J., Ishii, K.: Recognizing human action in time-sequential images using hidden markov model. In: Proc. IEEE Int. Conf. Computer Vision and Pattern Recognition, pp. 379\u2013385 (1992)","DOI":"10.1109\/CVPR.1992.223161"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Wilson, A.D., Bobick, A.F.: Parametric hidden markov models for gesture recognition. IEEE Trans. Pattern Analysis and Machine Intell., 884\u2013900 (1999)","DOI":"10.1109\/34.790429"},{"key":"45_CR5","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1109\/34.868684","volume":"22","author":"N. Oliver","year":"2000","unstructured":"Oliver, N., Rosario, B., Pentland, A.: A bayesian computer vision system for modeling human interactions. IEEE Trans. Pattern Analysis and Machine Intell.\u00a022, 844\u2013851 (2000)","journal-title":"IEEE Trans. Pattern Analysis and Machine Intell."},{"key":"45_CR6","doi-asserted-by":"crossref","unstructured":"Eng, H.-L., Wang, J.X., Kam, A.H., Yau, W.-Y.: Novel region-based modeling for human detection within highly dynamic aquatic environment. In: Proc. IEEE Int. Conf. Computer Vision and Pattern Recognition, vol.\u00a02, pp. 390\u2013397 (2004)","DOI":"10.1109\/CVPR.2004.1315190"},{"key":"45_CR7","unstructured":"Pia, F.: Observation on the drowning of nonswimmers. J. Physic. Edu., 164\u2013167 (1974)"},{"key":"45_CR8","unstructured":"Pia, F.: Reflections on lifeguarding surveilance programs. In: Proc. Reflections on Lifeguarding Conf. (1974)"},{"key":"45_CR9","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TSMCC.2005.848184","volume":"35","author":"K.-A. Toh","year":"2005","unstructured":"Toh, K.-A., Yau, W.-Y.: Fingerprint and Speaker Verification Decisions Fusion Using A Functional Link Network. IEEE Trans. on Systems, Man, and Cybernetics Part C\u00a035, 357\u2013370 (2005)","journal-title":"IEEE Trans. on Systems, Man, and Cybernetics Part C"},{"key":"45_CR10","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L.R. Rabiner","year":"1989","unstructured":"Rabiner, L.R.: A tutorial on hidden markov models and selected applications in speech recognition. Proc. IEEE\u00a077, 257\u2013288 (1989)","journal-title":"Proc. IEEE"},{"key":"45_CR11","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1109\/34.825759","volume":"22","author":"N. Ueda","year":"2000","unstructured":"Ueda, N.: Optimal linear combination of neural networks for improving classification performance. IEEE Trans. Pattern Anal. Machine Intell.\u00a022, 207\u2013215 (2000)","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"key":"45_CR12","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/0893-6080(89)90020-8","volume":"2","author":"K. Hornik","year":"1989","unstructured":"Hornik, K., Stinchcombe, M., White, H.: Multi-layer feedforward networks are universal approximatorss. Neural Networks\u00a02, 359\u2013366 (1989)","journal-title":"Neural Networks"}],"container-title":["Lecture Notes in Computer Science","Advances in Visual Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11595755_45.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,5]],"date-time":"2025-01-05T23:24:56Z","timestamp":1736119496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11595755_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540307501","9783540322849"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11595755_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}