{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:25:49Z","timestamp":1762521949442,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319464534"},{"type":"electronic","value":"9783319464541"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46454-1_21","type":"book-chapter","created":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T09:15:09Z","timestamp":1473930909000},"page":"334-349","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":129,"title":["A Discriminative Framework for Anomaly Detection in Large Videos"],"prefix":"10.1007","author":[{"given":"Allison","family":"Del Giorno","sequence":"first","affiliation":[]},{"given":"J. Andrew","family":"Bagnell","sequence":"additional","affiliation":[]},{"given":"Martial","family":"Hebert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,16]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Zhao, B., Fei-Fei, L., Xing, E.: Online detection of unusual events in videos via dynamic sparse coding. In: 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3313\u20133320, June 2011","DOI":"10.1109\/CVPR.2011.5995524"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Lu, C., Shi, J., Jia, J.: Abnormal event detection at 150 fps in matlab. In: 2013 IEEE International Conference on Computer Vision (ICCV), pp. 2720\u20132727. IEEE (2013)","DOI":"10.1109\/ICCV.2013.338"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Mahadevan, V., Li, W., Bhalodia, V., Vasconcelos, N.: Anomaly detection in crowded scenes. In: 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1975\u20131981. IEEE (2010)","DOI":"10.1109\/CVPR.2010.5539872"},{"key":"21_CR4","unstructured":"Kim, J., Grauman, K.: Observe locally, infer globally: a space-time MRF for detecting abnormal activities with incremental updates. In: IEEE Conference on Computer Vision and Pattern Recognition, 2009, CVPR 2009, pp. 2921\u20132928. IEEE (2009)"},{"issue":"1","key":"21_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/TPAMI.2013.111","volume":"36","author":"W Li","year":"2014","unstructured":"Li, W., Mahadevan, V., Vasconcelos, N.: Anomaly detection and localization in crowded scenes. IEEE Trans. Pattern Anal. Mach. Intell. 36(1), 18\u201332 (2014)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"21_CR6","unstructured":"Mehran, R., Oyama, A., Shah, M.: Abnormal crowd behavior detection using social force model. In: IEEE Conference on Computer Vision and Pattern Recognition, 2009, CVPR 2009, pp. 935\u2013942. IEEE (2009)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Anti\u0107, B., Ommer, B.: Video parsing for abnormality detection. In: 2011 IEEE International Conference on Computer Vision (ICCV), pp. 2415\u20132422. IEEE (2011)","DOI":"10.1109\/ICCV.2011.6126525"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Roshtkhari, M., Levine, M.: Online dominant and anomalous behavior detection in videos. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 2611\u20132618 (2013)","DOI":"10.1109\/CVPR.2013.337"},{"issue":"8","key":"21_CR9","doi-asserted-by":"publisher","first-page":"1099","DOI":"10.1016\/j.cviu.2011.03.003","volume":"115","author":"S Calderara","year":"2011","unstructured":"Calderara, S., Heinemann, U., Prati, A., Cucchiara, R., Tishby, N.: Detecting anomalies in peoples trajectories using spectral graph analysis. Comput. Vis. Image Underst. 115(8), 1099\u20131111 (2011)","journal-title":"Comput. Vis. Image Underst."},{"key":"21_CR10","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.neunet.2013.01.012","volume":"43","author":"S Liu","year":"2013","unstructured":"Liu, S., Yamada, M., Collier, N., Sugiyama, M.: Change-point detection in time-series data by relative density-ratio estimation. Neural Netw. 43, 72\u201383 (2013)","journal-title":"Neural Netw."},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-642-33885-4_16","volume-title":"Computer Vision \u2013 ECCV 2012. Workshops and Demonstrations","author":"Y Ito","year":"2012","unstructured":"Ito, Y., Kitani, K.M., Bagnell, J.A., Hebert, M.: Detecting interesting events using unsupervised density ratio estimation. In: Fusiello, A., Murino, V., Cucchiara, R. (eds.) ECCV 2012. LNCS, vol. 7585, pp. 151\u2013161. Springer, Heidelberg (2012). doi:\n                      10.1007\/978-3-642-33885-4_16"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Kawahara, Y., Sugiyama, M.: Change-point detection in time-series data by direct density-ratio estimation. In: SDM, vol. 9, pp. 389\u2013400. SIAM (2009)","DOI":"10.1137\/1.9781611972795.34"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Sugiyama, M., Suzuki, T., Kanamori, T.: Density ratio estimation: a comprehensive review. RIMS Kokyuroku, pp. 10\u201331 (2010)","DOI":"10.1017\/CBO9781139035613"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Wang, H., Kl\u00e4ser, A., Schmid, C., Liu, C.L.: Action recognition by dense trajectories. In: 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3169\u20133176. IEEE (2011)","DOI":"10.1109\/CVPR.2011.5995407"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Motwani, R., Raghavan, P.: Randomized algorithms. Chapman & Hall\/CRC (2010)","DOI":"10.1201\/9781584888239-c12"},{"key":"21_CR16","unstructured":"Kakade, S.: Hoeffding, Chernoff, Bennet, and Bernstein Bounds. \n                      http:\/\/stat.wharton.upenn.edu\/ skakade\/courses\/stat928\/lectures\/lecture06.pdf"},{"issue":"1\u20132","key":"21_CR17","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s10994-009-5152-4","volume":"79","author":"S Ben-David","year":"2010","unstructured":"Ben-David, S., Blitzer, J., Crammer, K., Kulesza, A., Pereira, F., Vaughan, J.W.: A theory of learning from different domains. Mach. Learn. 79(1\u20132), 151\u2013175 (2010)","journal-title":"Mach. Learn."},{"key":"21_CR18","first-page":"463","volume":"3","author":"PL Bartlett","year":"2003","unstructured":"Bartlett, P.L., Mendelson, S.: Rademacher and gaussian complexities: risk bounds and structural results. J. Mach. Learn. Res. 3, 463\u2013482 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"21_CR19","unstructured":"Balcan, M.F.: Rademacher complexity. \n                      http:\/\/www.cs.cmu.edu\/ ninamf\/ML11\/lect1117.pdf"},{"issue":"2","key":"21_CR20","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1002\/jrsm.12","volume":"1","author":"M Borenstein","year":"2010","unstructured":"Borenstein, M., Hedges, L.V., Higgins, J., Rothstein, H.R.: A basic introduction to fixed-effect and random-effects models for meta-analysis. Res. Synth. Methods 1(2), 97\u2013111 (2010)","journal-title":"Res. Synth. Methods"},{"issue":"3","key":"21_CR21","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/TPAMI.2007.70825","volume":"30","author":"A Adam","year":"2008","unstructured":"Adam, A., Rivlin, E., Shimshoni, I., Reinitz, D.: Robust real-time unusual event detection using multiple fixed-location monitors. IEEE Trans. Pattern Anal. Mach. Intell. 30(3), 555\u2013560 (2008)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"21_CR22","unstructured":"Minnesota, U.: Crowd activity dataset. \n                      http:\/\/mha.cs.umn.edu\/proj_events.shtml"},{"key":"21_CR23","unstructured":"Andrei Zaharescu, R.P.W.: Anomalous behavior data set. \n                      http:\/\/vision.eecs.yorku.ca\/research\/anomalous-behaviour-data\/\n                      \n                    . Accessed 01 March 2016"}],"container-title":["Lecture Notes in Computer Science","Computer Vision \u2013 ECCV 2016"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46454-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T01:43:02Z","timestamp":1602294182000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46454-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319464534","9783319464541"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46454-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"16 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECCV","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Computer Vision","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Amsterdam","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eccv2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.eccv2016.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}