{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:43:19Z","timestamp":1726036999470},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030248994"},{"type":"electronic","value":"9783030249007"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24900-7_5","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T04:12:15Z","timestamp":1562731935000},"page":"65-75","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Framework to Identify People in Unstructured Environments Incorporating Biometrics"],"prefix":"10.1007","author":[{"given":"Janelle","family":"Mason","sequence":"first","affiliation":[]},{"given":"Prosenjit","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Kaushik","family":"Roy","sequence":"additional","affiliation":[]},{"given":"Albert","family":"Esterline","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Alvarez-Melis, D., Jaakkola, T.S.: A causal framework for explaining the predictions of black-box sequence-to-sequence models. arXiv preprint arXiv:1707.01943 (2017)","DOI":"10.18653\/v1\/D17-1042"},{"key":"5_CR2","unstructured":"Bahdanau, D., Cho, K., Bengio, Y.: Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473 (2014)"},{"key":"5_CR3","unstructured":"Barwise, J., Perry, J.: Situations and Attitudes (new ed.). Center for the Study of Language and Information, New York (1998)"},{"key":"5_CR4","unstructured":"Chan, W., Jaitly, N., Le, Q.V., Vinyals, O.: Listen, attend and spell. arXiv preprint arXiv:1508.01211 1(2), 3 (2015)"},{"issue":"5","key":"5_CR5","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1017\/S1930297500000590","volume":"2","author":"SP Curley","year":"2007","unstructured":"Curley, S.P.: The application of Dempster-Shafer theory demonstrated with justification provided by legal evidence. Judgment Decis. Mak. 2(5), 257 (2007)","journal-title":"Judgment Decis. Mak."},{"key":"5_CR6","volume-title":"Logic and Information","author":"K Devlin","year":"1995","unstructured":"Devlin, K.: Logic and Information. Cambridge University Press, Cambridge (1995)"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/0004-3702(94)00041-X","volume":"77","author":"PM Dung","year":"1995","unstructured":"Dung, P.M.: On the acceptability of arguments and its fundamental role in nonmonotonic reasoning, logic programming and n-person games. Artif. Intell. 77(2), 321\u2013357 (1995)","journal-title":"Artif. Intell."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Esterline, A., Nick, W., Mason, J.: Situations, information, and evidence (late breaking report). In: 2018 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 171\u2013173. IEEE (2018)","DOI":"10.1109\/COGSIMA.2018.8423970"},{"key":"5_CR9","unstructured":"Giannelli, P.C.: Chain of custody. In: Faculty Publications, School of Law, Case Western Reserve University, p. 309 (1993)"},{"key":"5_CR10","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139626866","volume-title":"Evidence Matters: Science, Proof, and Truth in the Law","author":"S Haack","year":"2014","unstructured":"Haack, S.: Evidence Matters: Science, Proof, and Truth in the Law. Cambridge University Press, Cambridge (2014)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Haenni, R.: Uncover Dempster\u2019s Rule Where it is Hidden. In: FUSION, pp. 1\u20138 (2006)","DOI":"10.1109\/ICIF.2006.301675"},{"key":"5_CR12","volume-title":"Reasoning About Uncertainty","author":"JY Halpern","year":"2005","unstructured":"Halpern, J.Y.: Reasoning About Uncertainty. MIT Press, Cambridge (2005)"},{"issue":"2","key":"5_CR13","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s11023-011-9230-6","volume":"21","author":"H Halpin","year":"2011","unstructured":"Halpin, H.: Sense and reference on the web. Minds Mach. 21(2), 153\u2013178 (2011)","journal-title":"Minds Mach."},{"key":"5_CR14","volume-title":"Naming and Necessity","author":"S Kripke","year":"1980","unstructured":"Kripke, S.: Naming and Necessity. Harvard University Press, Cambridge (1980)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"McDaniel, M., Sloan, E., Day, S., et al.: Situation-based ontologies for a computational framework for identity focusing on crime scenes. In: 2017 IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), pp. 1\u20137, March 2017","DOI":"10.1109\/COGSIMA.2017.7929579"},{"key":"5_CR16","unstructured":"Merriam-Webster Online. Merriam-Webster Online Dictionary entry: Profiling. https:\/\/www.merriamwebster.com\/dictionary\/profiling . Accessed 02 Jan 2019"},{"key":"5_CR17","first-page":"131","volume":"7","author":"H Putnam","year":"1975","unstructured":"Putnam, H.: The meaning of \u2018meaning\u2019. Minn. Stud. Philos. Sci. 7, 131\u2013193 (1975)","journal-title":"Minn. Stud. Philos. Sci."},{"issue":"1","key":"5_CR18","first-page":"55","volume":"2","author":"MP Rani","year":"2010","unstructured":"Rani, M.P., Arumugam, G.: An efficient gait recognition system for human identification using modified ica. Int. J. Comput. Sci. Inf. Technol. 2(1), 55\u201367 (2010)","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"issue":"2","key":"5_CR19","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/0004-3702(94)90026-4","volume":"66","author":"P Smets","year":"1994","unstructured":"Smets, P., Kennes, R.: The transferable belief model. Artif. Intell. 66(2), 191\u2013234 (1994)","journal-title":"Artif. Intell."},{"key":"5_CR20","unstructured":"The American Heritage Dictionary. The American heritage dictionary entry: given name. https:\/\/ahdictionary.com\/word\/search.html?q=given+name . Accessed 02 Jan 2019"},{"key":"5_CR21","volume-title":"An Introduction to Multiagent Systems","author":"M Wooldridge","year":"2009","unstructured":"Wooldridge, M.: An Introduction to Multiagent Systems. Wiley, Hoboken (2009)"},{"issue":"3","key":"5_CR22","doi-asserted-by":"publisher","first-page":"778","DOI":"10.1016\/j.patcog.2007.06.019","volume":"41","author":"X Zhou","year":"2008","unstructured":"Zhou, X., Bhanu, B.: Feature fusion of side face and gait for video-based human identification. Pattern Recognit. 41(3), 778\u2013795 (2008)","journal-title":"Pattern Recognit."},{"key":"5_CR23","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.patrec.2015.08.026","volume":"82","author":"Fernando Alonso-Fernandez","year":"2016","unstructured":"Alonso-Fernandez, F., Bigun, J.: A survey on periocular biometrics research. Pattern Recognit. Lett. 82, 92\u2013105 (2018). https:\/\/arxiv.org\/abs\/1810.03360","journal-title":"Pattern Recognition Letters"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Bartuzi, E., Roszczewska, K., Czajka, A., Pacut, A.: Unconstrained biometrie recognition based on thermal hand images. In: 2018 International Workshop on Biometrics and Forensics (IWBF), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/IWBF.2018.8401567"},{"issue":"8","key":"5_CR25","doi-asserted-by":"publisher","first-page":"2001","DOI":"10.1109\/TIFS.2018.2807791","volume":"13","author":"E Gonzalez-Sosa","year":"2018","unstructured":"Gonzalez-Sosa, E., Fierrez, J., Vera-Rodriguez, R., Alonso-Fernandez, F.: Facial soft biometrics for recognition in the wild: Recent works, annotation, and COTS evaluation. IEEE Trans. Inf. Forensics Secur. 13(8), 2001\u20132014 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Mason, J., Kyei, K., Foster, H., Esterline, A.: A framework for identity: Dempster-Shafer theory the flow and combination of evidence. In: 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp. 1700\u20131706. IEEE (2018)","DOI":"10.1109\/SSCI.2018.8628738"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Mason, J., et al.: A computational framework for identity based on situation theory. In: International Symposium on Affective Science and Engineering, pp. 1\u20137. Japan Society of Kansei Engineering (2018)","DOI":"10.5057\/isase.2018-C000027"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24900-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T00:05:27Z","timestamp":1694995527000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24900-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030248994","9783030249007"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24900-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}