{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T22:40:01Z","timestamp":1746398401755,"version":"3.40.4"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319116792"},{"type":"electronic","value":"9783319116808"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-11680-8_16","type":"book-chapter","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T17:25:41Z","timestamp":1412011541000},"page":"195-207","source":"Crossref","is-referenced-by-count":1,"title":["Using Attribute Relationships for Person Re-Identification"],"prefix":"10.1007","author":[{"given":"Ngoc-Bao","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Vu-Hoang","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Thanh Ngo","family":"Duc","sequence":"additional","affiliation":[]},{"family":"Duy-Dinh","sequence":"additional","affiliation":[]},{"given":"Duc Anh","family":"Duong","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/978-3-642-33863-2_38","volume-title":"Computer Vision \u2013 ECCV 2012. Workshops and Demonstrations","author":"T. Avraham","year":"2012","unstructured":"Avraham, T., Gurvich, I., Lindenbaum, M., Markovitch, S.: Learning Implicit Transfer for Person Re-identification. In: Fusiello, A., Murino, V., Cucchiara, R. (eds.) ECCV 2012 Ws\/Demos, Part I. LNCS, vol.\u00a07583, pp. 381\u2013390. Springer, Heidelberg (2012)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Transactions on Intelligent Systems and Technology (TIST)\u00a02(3), 27 (2011)","DOI":"10.1145\/1961189.1961199"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Farenzena, M., Bazzani, L., Perina, A., Murino, V., Cristani, M.: Person re-identification by symmetry-driven accumulation of local features. In: Proceedings of the 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2010), San Francisco, CA, USA. IEEE Computer Society (2010)","DOI":"10.1109\/CVPR.2010.5539926"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Gheissari, N., Sebastian, T.B., Hartley, R.: Person reidentification using spatiotemporal appearance. In: 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol.\u00a02, pp. 1528\u20131535 (2006)","DOI":"10.1109\/CVPR.2006.223"},{"key":"16_CR5","unstructured":"Gray, D., Brennan, S., Tao, H.: Evaluating appearance models for recognition, reacquisition, and tracking. In: IEEE International Workshop on Performance Evaluation of Tracking and Surveillance. Citeseer (2007)"},{"key":"16_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/978-3-540-70504-8","volume-title":"Computer Vision \u2013 ECCV 2008","author":"D. Gray","year":"2008","unstructured":"Gray, D., Tao, H.: Viewpoint invariant pedestrian recognition with an ensemble of localized features. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008, Part I. LNCS, vol.\u00a05302, pp. 262\u2013275. Springer, Heidelberg (2008)"},{"key":"16_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/978-3-642-21227-7_9","volume-title":"Image Analysis","author":"M. Hirzer","year":"2011","unstructured":"Hirzer, M., Beleznai, C., Roth, P.M., Bischof, H.: Person re-identification by descriptive and discriminative classification. In: Heyden, A., Kahl, F. (eds.) SCIA 2011. LNCS, vol.\u00a06688, pp. 91\u2013102. Springer, Heidelberg (2011)"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Layne, R., Hospedales, T., Gong, S.: Person re-identification by attributes. In: Proceedings of the British Machine Vision Conference, pp. 24.1\u201324.11. BMVA Press (2012)","DOI":"10.5244\/C.26.24"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Layne, R., Hospedales, T.M., Gong, S.: Attributes-based re-identification. In: Person Re-Identification, pp. 93\u2013117. Springer (2014)","DOI":"10.1007\/978-1-4471-6296-4_5"},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1007\/978-3-642-33863-2_39","volume-title":"Computer Vision \u2013 ECCV 2012. Workshops and Demonstrations","author":"C. Liu","year":"2012","unstructured":"Liu, C., Gong, S., Loy, C.C., Lin, X.: Person re-identification: What features are important? In: Fusiello, A., Murino, V., Cucchiara, R. (eds.) ECCV 2012 Ws\/Demos, Part I. LNCS, vol.\u00a07583, pp. 391\u2013401. Springer, Heidelberg (2012)"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"Ma, B., Su, Y., Jurie, F.: Bicov: a novel image representation for person re-identification and face verification. In: Proceedings of the British Machine Vision Conference, pp. 57.1\u201357.11. BMVA Press (2012)","DOI":"10.5244\/C.26.57"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Oreifej, O., Mehran, R., Shah, M.: Human identity recognition in aerial images. In: 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 709\u2013716 (2010)","DOI":"10.1109\/CVPR.2010.5540147"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Prosser, B., Zheng, W.-S., Gong, S., Xiang, T.: Person re-identification by support vector ranking. In: Proceedings of the British Machine Vision Conference, pp. 21.1\u201321.11. BMVA Press (2010), doi:10.5244\/C.24.21","DOI":"10.5244\/C.24.21"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Prosser, B., Zheng, W.-S., Gong, S., Xiang, T., Mary, Q.: Person re-identification by support vector ranking. In: BMVC, vol.\u00a01, p. 5 (2010)","DOI":"10.5244\/C.24.21"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Schwartz, W.R., Davis, L.S.: Learning Discriminative Appearance-Based Models Using Partial Least Squares. In: Proceedings of the XXII Brazilian Symposium on Computer Graphics and Image Processing (2009)","DOI":"10.1109\/SIBGRAPI.2009.42"},{"key":"16_CR16","unstructured":"Lindenbaum, M., Brand, Y., Avraham, T.: Transitive re-identification. In: Proceedings of the British Machine Vision Conference. BMVA Press (2013)"}],"container-title":["Advances in Intelligent Systems and Computing","Knowledge and Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11680-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T22:15:41Z","timestamp":1746396941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11680-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319116792","9783319116808"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11680-8_16","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}