{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:06:43Z","timestamp":1748664403964,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319226880"},{"type":"electronic","value":"9783319226897"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22689-7_40","type":"book-chapter","created":{"date-parts":[[2015,8,31]],"date-time":"2015-08-31T08:25:49Z","timestamp":1441009549000},"page":"517-528","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Prototype for Anomaly Detection in Video Surveillance Context"],"prefix":"10.1007","author":[{"given":"F.","family":"Persia","sequence":"first","affiliation":[]},{"given":"D.","family":"D\u2019Auria","sequence":"additional","affiliation":[]},{"given":"G.","family":"Sperl\u00ed","sequence":"additional","affiliation":[]},{"given":"A.","family":"Tufano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,1]]},"reference":[{"issue":"3","key":"40_CR1","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1109\/TKDE.2013.33","volume":"26","author":"M Albanese","year":"2014","unstructured":"Albanese, M., Molinaro, C., Persia, F., Picariello, A., Subrahmanian, V.S.: Discovering the Top-k unexplained sequences in time-stamped observation data. IEEE Trans. Knowl. Data Eng. (TKDE) 26(3), 577\u2013594 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng. (TKDE)"},{"key":"40_CR2","doi-asserted-by":"crossref","unstructured":"Albanese, M., Molinaro, C., Persia, F., Picariello, A., Subrahmanian, V.S.: Finding unexplained activities in video. In: International Joint Conference on Artificial Intelligence (IJCAI), pp. 1628\u20131634 (2011)","DOI":"10.21236\/ADA587505"},{"key":"40_CR3","volume-title":"Understanding Surveillance Technologies","author":"JK Petersen","year":"2001","unstructured":"Petersen, J.K.: Understanding Surveillance Technologies. CRC Press, Boca Raton (2001)"},{"issue":"8","key":"40_CR4","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1109\/TPAMI.2000.868676","volume":"22","author":"R Collins","year":"2000","unstructured":"Collins, R., Lipton, A., Kanade, T.K.: Introduction to the special section on video surveillance. IEEE Trans. Patt. Anal. Mach. Intell. 22(8), 745\u2013746 (2000)","journal-title":"IEEE Trans. Patt. Anal. Mach. Intell."},{"key":"40_CR5","unstructured":"Regazzoni, C., Ramesh, V.: Scanning the Issue\/Technology Special Issue on Video Communications, Processing, and Understanding for Third Generation Surveillance Systems, University of Genoa, Siemens Corporate Research Inc., University of Udine, IEEE (2001)"},{"key":"40_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/3-540-47979-1_25","volume-title":"Computer Vision - ECCV 2002","author":"NT Siebel","year":"2002","unstructured":"Siebel, N.T., Maybank, S.J.: Fusion of multiple tracking algorithms for robust people tracking. In: Heyden, A., Sparr, G., Nielsen, M., Johansen, P. (eds.) ECCV 2002, Part IV. LNCS, vol. 2353, pp. 373\u2013387. Springer, Heidelberg (2002)"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Siebel, N.T., Maybank, S.: The advisor visual surveillance system. In: ECCV 2004 Workshop Applications of Computer Vision (ACV 2004) (2004)","DOI":"10.1016\/S0262-8856(04)00100-3"},{"key":"40_CR8","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1109\/TKDE.2011.246","volume":"25","author":"M Albanese","year":"2013","unstructured":"Albanese, M., Pugliese, A., Subrahmanian, V.S.: Fast activity detection: indexing for temporal stochastic automaton based activity models. IEEE Trans. Knowl. Data Eng. (TKDE) 25, 360\u2013373 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng. (TKDE)"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Persia, F., D\u2019Auria, D.: An application for finding expected activities in medial context scientific databases. In: SEBD 2014, pp. 77\u201388 (2014)","DOI":"10.5220\/0005146504460453"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"D\u2019Auria, D., Persia, F.: Automatic evaluation of medical doctors\u2019 performances while using a cricothyrotomy simulator. In: IRI 2014, pp. 514\u2013519 (2014)","DOI":"10.1109\/IRI.2014.7051932"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"D\u2019Auria, D., Persia, F.: Discovering expected activities in medical context scientific databases. In: DATA 2014, pp. 446\u2013453 (2014)","DOI":"10.5220\/0005146504460453"},{"key":"40_CR12","doi-asserted-by":"crossref","unstructured":"Dung, P., Chi-Min, O., Soo-Hyung, K., In-Seop, N., Chil-Woo, L.: Object recognition by combining binary local invariant features and color histogram. In: 2013 2nd IAPR Asian Conference on Pattern Recognition (ACPR), pp. 466\u2013470 (2013)","DOI":"10.1109\/ACPR.2013.103"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Chaudhary, K., Mae, Y., Kojima, M., Arai, T.: Autonomous acquisition of generic handheld objects in unstructured environments via sequential back-tracking for object recognition. In: 2014 IEEE International Conference on Robotics and Automation (ICRA), pp. 4953\u20134958 (2014)","DOI":"10.1109\/ICRA.2014.6907585"},{"key":"40_CR14","doi-asserted-by":"crossref","unstructured":"Ubukata, T., Shibata, M., Terabayashi, K., Mora, A., Kawashita, T., Masuyama, G., Umeda, K.: Fast human detection combining range image segmentation and local feature based detection. In: 22nd International Conference on Pattern Recognition (ICPR), pp. 4281\u20134286 (2014)","DOI":"10.1109\/ICPR.2014.734"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Onal, I., Kardas, K., Rezaeitabar, Y., Bayram, U., Bal, M., Ulusoy, I., Cicekli, N.K.: A framework for detecting complex events in surveillance videos. In: 2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp. 1\u20136 (2013)","DOI":"10.1109\/ICMEW.2013.6618411"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Zin, T.T., Tin, P., Hama, H., Toriu, T.: An integrated framework for detecting suspicious behaviors in video surveillance. In: Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series (2014)","DOI":"10.1117\/12.2041232"}],"container-title":["Communications in Computer and Information Science","Intelligent Software Methodologies, Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22689-7_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T09:22:49Z","timestamp":1748596969000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22689-7_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319226880","9783319226897"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22689-7_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 September 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}