{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:40:58Z","timestamp":1777567258027,"version":"3.51.4"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319161983","type":"print"},{"value":"9783319161990","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16199-0_16","type":"book-chapter","created":{"date-parts":[[2015,3,19]],"date-time":"2015-03-19T09:28:47Z","timestamp":1426757327000},"page":"225-240","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Investigating Open-World Person Re-identification Using a Drone"],"prefix":"10.1007","author":[{"given":"Ryan","family":"Layne","sequence":"first","affiliation":[]},{"given":"Timothy M.","family":"Hospedales","sequence":"additional","affiliation":[]},{"given":"Shaogang","family":"Gong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,20]]},"reference":[{"key":"16_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/978-3-642-33863-2_38","volume-title":"Computer Vision \u2013 ECCV 2012","author":"T Avraham","year":"2012","unstructured":"Avraham, T., Gurvich, I., Lindenbaum, M., Markovitch, S.: Learning implicit transfer for person re-identification. In: Fusiello, A., Murino, V., Cucchiara, R. (eds.) ECCV 2012 Ws\/Demos, Part I. LNCS, vol. 7583, pp. 381\u2013390. Springer, Heidelberg (2012)"},{"key":"16_CR2","unstructured":"Bischof, H., Roth, P.M., Hirzer, M., Wohlhart, P., Kostinger, M.: Large scale metric learning from equivalence constraints. In: IEEE Conference on Computer Vision and Pattern Recognition (2012)"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Brand, Y., Avraham, T., Lindenbaum, M.: Transitive Re-identification. British Machine Vision Conference (3) (2013)","DOI":"10.5244\/C.27.46"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Cancella, B., Hospedales, T.M., Gong, S.: Open-World person re-identification by multi-label assignment inference. In: British Machine Vision Conference (2014)","DOI":"10.5244\/C.28.98"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Clarke, R.: Understanding the drone epidemic. Computer Law & Security Review 30(3) (2014)","DOI":"10.1016\/j.clsr.2014.03.002"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Doll\u00e1r, P., Appel, R., Belongie, S., Perona, P., Doll, P.: Fast Feature Pyramids for Object Detection. IEEE Transactions on Pattern Analysis and Machine Intelligence (2014)","DOI":"10.1109\/TPAMI.2014.2300479"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Farenzena, M., Bazzani, L., Perina, A., Murino, V., Cristani, M.: Person re-identification by symmetry-driven accumulation of local features. In: IEEE Conference on Computer Vision and Pattern Recognition (2010)","DOI":"10.1109\/CVPR.2010.5539926"},{"key":"16_CR8","unstructured":"Gong, B., Shi, Y., Sha, F., Grauman, K.: Geodesic flow kernel for unsupervised domain adaptation. In: IEEE Conference on Computer Vision and Pattern Recognition. IEEE (2012)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Gong, S., Cristani, M., Loy, C.C., Hospedales, T.M.: Person re-identification, chap. In: The Re-Identification Challenge. Springer (2013)","DOI":"10.1007\/978-1-4471-6296-4"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Gong, S., Cristani, M., Yan, S., Loy, C.C. (eds.): Person Re-identification. Springer (2014)","DOI":"10.1007\/978-1-4471-6296-4"},{"key":"16_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/978-3-540-70504-8","volume-title":"Computer Vision \u2013 ECCV 2008","author":"D Gray","year":"2008","unstructured":"Gray, D., Tao, H.: Viewpoint invariant pedestrian recognition with an ensemble of localized features. In: Forsyth, D., Torr, P., Zisserman, A. (eds.) ECCV 2008, Part I. LNCS, vol. 5302, pp. 262\u2013275. Springer, Heidelberg (2008)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1007\/978-3-642-21227-7_9","volume-title":"Image Analysis","author":"M Hirzer","year":"2011","unstructured":"Hirzer, M., Beleznai, C., Roth, P.M., Bischof, H.: Person re-identification by descriptive and discriminative classification. In: Heyden, A., Kahl, F. (eds.) SCIA 2011. LNCS, vol. 6688, pp. 91\u2013102. Springer, Heidelberg (2011)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"John, V., Englebienne, G., Krose, B.: Solving person re-identification in non-overlapping camera using efficient gibbs sampling. In: British Machine Vision Conference (2013)","DOI":"10.5244\/C.27.55"},{"key":"16_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1007\/978-3-642-33863-2_44","volume-title":"Computer Vision \u2013 ECCV 2012","author":"S Karaman","year":"2012","unstructured":"Karaman, S., Bagdanov, A.D.: Identity inference: generalizing person re-identification scenarios. In: Fusiello, A., Murino, V., Cucchiara, R. (eds.) ECCV 2012 Ws\/Demos, Part I. LNCS, vol. 7583, pp. 443\u2013452. Springer, Heidelberg (2012)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Khedhrer, M.I., el Yacoubi, M.A., Dorizzi, B.: Multi-shot surf-based person re-identification via sparse representation. In: Advanced Video Surveillance Systems (2013)","DOI":"10.1109\/AVSS.2013.6636633"},{"key":"16_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/978-3-642-33718-5_12","volume-title":"Computer Vision \u2013 ECCV 2012","author":"A Khosla","year":"2012","unstructured":"Khosla, A., Zhou, T., Malisiewicz, T., Efros, A.A., Torralba, A.: Undoing the damage of dataset bias. In: Fitzgibbon, A., Lazebnik, S., Perona, P., Sato, Y., Schmid, C. (eds.) ECCV 2012, Part I. LNCS, vol. 7572, pp. 158\u2013171. Springer, Heidelberg (2012)"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Kostinger, M., Hirzer, M., Wohlhart, P., Roth, P.M., Bischof, H.: Large scale metric learning from equivalence constraints. In: IEEE Conference on Computer Vision and Pattern Recognition (2012)","DOI":"10.1109\/CVPR.2012.6247939"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Layne, R., Hospedales, T.M., Gong, S.: Person re-identification by attributes. In: British Machine Vision Conference (2012)","DOI":"10.5244\/C.26.24"},{"key":"16_CR19","doi-asserted-by":"crossref","unstructured":"Layne, R., Hospedales, T.M., Gong, S.: Domain transfer for person re-identification. In: Workshop on Analysis and Retrieval of Tracked Events and Motion in Imagery Streams (ARTEMIS). Barcelona, Spain (2013)","DOI":"10.1145\/2510650.2510658"},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Li, W., Zhao, R., Wang, X.: Human reidentification with transferred metric learning. In: Asian Conference on Computer Vision (2012)","DOI":"10.1007\/978-3-642-37331-2_3"},{"key":"16_CR21","doi-asserted-by":"crossref","unstructured":"Loy, C.C., Xiang, T., Gong, S.: Time-Delayed Correlation Analysis for Multi-Camera Activity Understanding. International Journal of Computer Vision 90(1) (2010)","DOI":"10.1007\/s11263-010-0347-5"},{"key":"16_CR22","doi-asserted-by":"crossref","unstructured":"Ma, A.J., Yuen, P.C., Li, J.: Domain transfer support vector ranking for person re-identification without target camera label information. In: IEEE International Conference on Computer Vision (2013)","DOI":"10.1109\/ICCV.2013.443"},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Pan, S.J., Yang, Q.: A Survey on Transfer Learning. IEEE Transactions on Knowledge and Data Engineering 22(10) (2010)","DOI":"10.1109\/TKDE.2009.191"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Prosser, B., Zheng, W.S., Gong, S., Xiang, T.: Person re-identification by support vector ranking. In: British Machine Vision Conference (2010)","DOI":"10.5244\/C.24.21"},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Raja, Y., Gong, S.: Person re-identification, chap. In: Scalable Multi-Camera Tracking in a Metropolis. Springer (2013)","DOI":"10.1007\/978-1-4471-6296-4_20"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Salvagnini, P., Bazzani, L., Cristani, M., Murino, V.: Person re-identification with a ptz camera: an introductory study. In: IEEE International Conference on Image Processing (2013)","DOI":"10.1109\/ICIP.2013.6738733"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Schwartz, W., Davis, L.: Learning discriminative appearance-based models using partial least squares. In: 2009 XXII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI) (2009)","DOI":"10.1109\/SIBGRAPI.2009.42"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Sommerlade, E., Reid, I.: Information-theoretic active scene exploration. In: IEEE Conference on Computer Vision and Pattern Recognition (2008)","DOI":"10.1109\/CVPR.2008.4587522"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Tarjan, R.: Depth-First Search and Linear Graph Algorithms. SIAM Journal on Computing 1(2) (1972)","DOI":"10.1137\/0201010"},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Torralba, A., Efros, A.A.: Unbiased look at dataset bias. In: IEEE Conference on Computer Vision and Pattern Recognition (2011)","DOI":"10.1109\/CVPR.2011.5995347"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Vezzani, R., Baltieri, D., Cucchiara, R.: People Re-identification in Surveillance and Forensics: a Survey. ACM Computing Surveys 1(1) (2013)","DOI":"10.1145\/2543581.2543596"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhao, R.: Person re-identification, chap. In: Person Re-identification: System Design and Evaluation Overview. Springer (2013)","DOI":"10.1007\/978-1-4471-6296-4_17"},{"key":"16_CR33","doi-asserted-by":"crossref","unstructured":"Zhao, R., Ouyang, W., Wang, X.: Unsupervised salience learning for person re-identification. In: IEEE International Conference on Computer Vision (2013)","DOI":"10.1109\/CVPR.2013.460"}],"container-title":["Lecture Notes in Computer Science","Computer Vision - ECCV 2014 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16199-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T03:25:17Z","timestamp":1747797917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16199-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319161983","9783319161990"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16199-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"20 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}