{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T13:14:28Z","timestamp":1743081268457,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319189130"},{"type":"electronic","value":"9783319189147"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18914-7_54","type":"book-chapter","created":{"date-parts":[[2015,5,22]],"date-time":"2015-05-22T15:58:04Z","timestamp":1432310284000},"page":"516-525","source":"Crossref","is-referenced-by-count":5,"title":["Identification of Loitering Human Behaviour in Video Surveillance Environments"],"prefix":"10.1007","author":[{"given":"H\u00e9ctor F.","family":"G\u00f3mez A.","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rafael Mart\u00ednez","family":"Tom\u00e1s","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Susana Arias","family":"Tapia","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Antonio Fern\u00e1ndez","family":"Caballero","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sylvie","family":"Ratt\u00e9","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alexandra Gonz\u00e1lez","family":"Eras","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Patricia Lude\u00f1a","family":"Gonz\u00e1lez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"54_CR1","series-title":"Lecture Notes in Computer Science","first-page":"3","volume-title":"Advances in Database Technology EDBT \u201996","author":"R. Srikant","year":"1996","unstructured":"Srikant, R., Agrawal, R.: Mining sequential patterns: Generalizations and performance improvements. In: Apers, P.M.G., Bouzeghoub, M., Gardarin, G. (eds.) EDBT 1996. LNCS, vol.\u00a01057, pp. 3\u201317. Springer, Heidelberg (1996)"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Park, K., Lin, Y., Metsis, V., Le, Z., Makedon, F.: Abnormal human behavioural pattern detection in assisted living environmets. In: 3rd International Conference on Pervasive Technologies Related to Assistive Environments (2010)","DOI":"10.1145\/1839294.1839305"},{"issue":"3","key":"54_CR3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1057\/palgrave.sj.8350053","volume":"21","author":"N. Robertson","year":"2008","unstructured":"Robertson, N., Reid, I., Brady, M.: Automatic human behaviour recognition and explanation for CCTV video surveillance. Security Journal\u00a021(3), 173\u2013188 (2008)","journal-title":"Security Journal"},{"key":"54_CR4","unstructured":"Quian, H., Ou, Y., Wu, X., Meng, X., Xu, Y.: Support vector machine behaviour-based driver identification system. Journal of Robotics, 173\u2013188 (2008)"},{"issue":"5","key":"54_CR5","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1111\/j.1468-0394.2010.00545.x","volume":"25","author":"M. Leo","year":"2010","unstructured":"Leo, M., Spagnolo, P., D\u2019Orazio, R., Mazzeo, P., Distante, A.: Real-Time smart surveillance using motion analysis. Expert Systems\u00a025(5), 314\u2013337 (2010)","journal-title":"Expert Systems"},{"issue":"5","key":"54_CR6","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1111\/j.1468-0394.2007.00438.x","volume":"24","author":"R. Cuchiara","year":"2007","unstructured":"Cuchiara, R., Prati, A., Vezzani, R.: A multi-camera vision system for fall detection and alarm generation. Expert Systems\u00a024(5), 334\u2013345 (2007)","journal-title":"Expert Systems"},{"key":"54_CR7","unstructured":"Chikhaoui, B., Wang, S., Pigot, H.: A new Algorithm Based on Sequential Pattern for person identification in ubiquitous environments. In: Proceedings of the Fourth International Workshop on Knowledge Discovery from Sensor Data, pp. 20\u201328 (2010)"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Fern, X., Komireddy, C., Burnnet, M.: Mining Interpretable Human Strategies: A Case Study. In: 7th IEEE International Conference on Data Mining, pp. 475\u2013480 (2007)","DOI":"10.1109\/ICDM.2007.19"},{"key":"54_CR9","unstructured":"Chun, L.: Definition, detection, and evaluation of meeting events in airport surveillance videos. In: TRECVID Workshop (2008)"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Charkraborty, B., Bagdanov, A., Gonz\u00e1lez, J., Roca, X.: Human action recognition using an ensemble of body-part detectors. Expert Systems (2011), doi:10.1111\/j.1468-0394.2011.00610.x","DOI":"10.1111\/j.1468-0394.2011.00610.x"},{"key":"54_CR11","unstructured":"Levenshtein, V.: Binary codes capable of correcting deletions, insertions, and reversals. Soviet Physics Doklady\u00a010(8) (1966)"},{"key":"54_CR12","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.patrec.2013.09.009","volume":"50","author":"A. Hern\u00e1ndez-Vela","year":"2014","unstructured":"Hern\u00e1ndez-Vela, A., Bautista, M., Perez-Sala, X., Ponce-L\u00f3pez, V., Escalera, S., Bar\u00f3, X., Angulo, C.: Probability-based dynamic time warping and bag-of-visual-and-depth-words for human gesture recognition in rgb-d. Pattern Recognition Letters\u00a050, 112\u2013121 (2014)","journal-title":"Pattern Recognition Letters"},{"key":"54_CR13","unstructured":"Iglesias, A.: Modelado Autom\u00e1tico del Comportamiento de Agentes Inteligentes. PhD dissertation Universidad Carlos III Madrid, Spain (2010)"},{"issue":"11","key":"54_CR14","doi-asserted-by":"publisher","first-page":"9","DOI":"10.5120\/956-1333","volume":"5","author":"J. Pillai","year":"2010","unstructured":"Pillai, J., Vyas, O.P.: Overview of itemset utility mining and its applications. International Journal of Computer Applications\u00a05(11), 9\u201313 (2010)","journal-title":"International Journal of Computer Applications"},{"issue":"4","key":"54_CR15","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/S1389-1286(00)00138-9","volume":"34","author":"S. Manganaris","year":"2000","unstructured":"Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.: A data mining analysis of RTID alarms. Computer Networks\u00a034(4), 571\u2013577 (2000)","journal-title":"Computer Networks"},{"key":"54_CR16","unstructured":"CAVIAR-Project: CAVIAR Project (May 20, 2009), \n                      http:\/\/home-pages.inf.ed.ac.uk\/rbf\/CAVIAR"},{"key":"54_CR17","doi-asserted-by":"crossref","unstructured":"Williem, A., Vamsi, M., Boles, K., Wageeh, W.: Detecting Uncommon Trajectories. In: Digital Image Computing: Techniques and Applications, pp. 398\u2013404 (2008)","DOI":"10.1109\/DICTA.2008.45"}],"container-title":["Lecture Notes in Computer Science","Artificial Computation in Biology and Medicine"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18914-7_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T12:20:53Z","timestamp":1675858853000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18914-7_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319189130","9783319189147"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18914-7_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}