{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:12:47Z","timestamp":1725869567586},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319486703"},{"type":"electronic","value":"9783319486710"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48671-0_24","type":"book-chapter","created":{"date-parts":[[2016,10,30]],"date-time":"2016-10-30T23:53:29Z","timestamp":1477871609000},"page":"261-272","source":"Crossref","is-referenced-by-count":0,"title":["Cloud-Based Video Surveillance System Using EFD-GMM for Object Detection"],"prefix":"10.1007","author":[{"given":"Ce","family":"Li","sequence":"first","affiliation":[]},{"given":"Jianchen","family":"Su","sequence":"additional","affiliation":[]},{"given":"Baochang","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"issue":"5","key":"24_CR1","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1109\/TSMCC.2010.2042446","volume":"40","author":"TD Raty","year":"2010","unstructured":"Raty, T.D.: Survey on contemporary remote surveillance systems for public safety. IEEE Trans. Syst. Man Cybern. C Appl. Rev. 40(5), 493\u2013515 (2010)","journal-title":"IEEE Trans. Syst. Man Cybern. C Appl. Rev."},{"issue":"2","key":"24_CR2","first-page":"317","volume":"16","author":"YJ Ren","year":"2015","unstructured":"Ren, Y.J., Shen, J., Wang, J., Han, J., Lee, S.: Mutual verifiable provable data auditing in public cloud storage. J. Internet Technol. 16(2), 317\u2013323 (2015)","journal-title":"J. Internet Technol."},{"key":"24_CR3","unstructured":"Karimaa, A.: Video surveillance in the cloud: dependability analysis. In: Proceedings of 4th International Conference on Dependability, pp. 92\u201395 (2011)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Hossain, M.S., Hassan, M.M., Qurishi, M.A., Alghamdi, A..: Resource allocation for service composition in cloud-based video surveillance platform. In: Proceedings of IEEE International Conference on Multimedia and Expo Workshops, pp. 408\u2013412 (2012)","DOI":"10.1109\/ICMEW.2012.77"},{"key":"24_CR5","doi-asserted-by":"crossref","unstructured":"Lin, C.F., Yuan, S.M., Leu, M.C., Tsai, C.T.: A framework for scalable cloud video recorder system in surveillance environment. In: Proceedings of 9th International Conference on Ubiquitous Intelligence & Computing and Autonomic & Trusted Computing, pp. 655\u2013660 (2012)","DOI":"10.1109\/UIC-ATC.2012.72"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Hossain, M.A.: Analyzing the suitability of cloud based multimedia surveillance systems. In: Proceedings of 15th IEEE International Conference on High Performance Computing and Communications (2013)","DOI":"10.1109\/HPCC.and.EUC.2013.96"},{"key":"24_CR7","unstructured":"Neal, D., Rahman, S.: Video surveillance in the cloud. J. Crypt. Inf. Secur. 2(3) (2015)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Sabahi, F.: Cloud computing security threats and responses. In: Proceedings of 3rd International Conference on Communication Software and Networks, pp. 245\u2013249 (2011)","DOI":"10.1109\/ICCSN.2011.6014715"},{"issue":"3","key":"24_CR9","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1057\/jit.2012.17","volume":"27","author":"W Venters","year":"2012","unstructured":"Venters, W., Whitley, E.A.: A critical review of cloud computing: researching desires and realities. J. Inf. Technol. 27(3), 179\u2013197 (2012)","journal-title":"J. Inf. Technol."},{"key":"24_CR10","doi-asserted-by":"crossref","unstructured":"Hossain, M.A.: Framework for a Cloud-based Multimedia Surveillance System. J. Distrib. Sens. Netw. (2014)","DOI":"10.1155\/2014\/135257"},{"key":"24_CR11","unstructured":"Cucchiara, R., Prati, A., Vezzani, R.: Designing video surveillance systems as services. In: Proceedings of 2nd Workshop on Video Surveillance Projects, Italy (2011)"},{"issue":"3","key":"24_CR12","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TIFS.2014.2381872","volume":"10","author":"J Li","year":"2015","unstructured":"Li, J., Li, X.L., Yang, B., Sun, X.M.: Segmentation-based image copy-move forgery detection scheme. IEEE Trans. Inf. Forensics Secur. 10(3), 507\u2013518 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"24_CR13","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/34.868688","volume":"22","author":"J Shi","year":"2000","unstructured":"Shi, J., Malik, J.: Normalized cuts and image segmentation. IEEE Trans. PAMI 22(8), 888\u2013905 (2000)","journal-title":"IEEE Trans. PAMI"},{"key":"24_CR14","volume-title":"Markov Random Field Modeling in Image Analysis","author":"SZ Li","year":"2009","unstructured":"Li, S.Z.: Markov Random Field Modeling in Image Analysis. Springer, Heidelberg (2009)"},{"key":"24_CR15","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1007\/s11263-016-0880-y","volume":"118","author":"BC Zhang","year":"2016","unstructured":"Zhang, B.C., Perina, A., Li, Z.G., Murino, V., Liu, J.Z., Ji, R.R.: Bounding multiple gaussians uncertainty with application to object tracking. IJCV 118, 364\u2013379 (2016)","journal-title":"IJCV"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, B.C., Li, Z.G., Perina, A., Bue, A.D., Murino V.: Adaptive local movement modelling (ALMM) for object tracking. In: IEEE Transactions on CSVT (2016)","DOI":"10.1109\/WACV.2015.11"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, B.C., Perina, A., Murino, V., Bue, A.D.: Sparse representation classification with manifold constraints transfer. In: Proceedings of CVPR, pp. 4557\u20134565 (2015)","DOI":"10.1109\/CVPR.2015.7299086"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Mahmood, A.M., Maras, H.H., Elbasi, E.: Measurement of edge detection algorithms in clean and noisy environment. In: Proceedings of 8th International Conference on Application of Information and Communication Technologies, pp. 1\u20136 (2014)","DOI":"10.1109\/ICAICT.2014.7035954"},{"key":"24_CR19","unstructured":"Shen, R.: Building a cloud-enabled file storage infrastructure. Tech Republic White Paper, F5 Network (2013)"},{"issue":"5","key":"24_CR20","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MIC.2009.119","volume":"13","author":"B Sotomayor","year":"2009","unstructured":"Sotomayor, B., Montero, R.S., Lorente, I.M., Foster, I.: Virtual infrastructure management in private and hybrid clouds. IEEE Internet Comput. 13(5), 14\u201322 (2009)","journal-title":"IEEE Internet Comput."},{"key":"24_CR21","doi-asserted-by":"crossref","unstructured":"Beloglazov, A., Buyya, R.: Energy efficient resource management in virtualized cloud data centers. In: Proceedings of 10th IEEE ACM International Symposium on Cluster, Cloud, and Grid Computing, pp. 826\u2013831 (2010)","DOI":"10.1109\/CCGRID.2010.46"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Liu, X.D., Yu, Y., Liu, B., Li, Z.: Bowstring-based dual-threshold computation method for adaptive canny edge detector. In: Proceedings of International Conference of Image and Vision Computing, New Zealand, pp. 13\u201318 (2013)","DOI":"10.1109\/IVCNZ.2013.6726985"},{"issue":"7","key":"24_CR23","doi-asserted-by":"crossref","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. Trans. Neural Netw. Learn. Syst. 26(7), 1403\u20131416 (2015)","journal-title":"Trans. Neural Netw. Learn. Syst."},{"issue":"2","key":"24_CR24","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1109\/TBC.2014.2321682","volume":"60","author":"ZQ Pan","year":"2014","unstructured":"Pan, Z.Q., Kwong, S., Sun, M.T., Lei, J.J.: Early MERGE mode decision based on motion estimation and hierarchical depth correlation for HEVC. IEEE Trans. Broadcast. 60(2), 405\u2013412 (2014)","journal-title":"IEEE Trans. Broadcast."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48671-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T00:46:09Z","timestamp":1568508369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48671-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319486703","9783319486710"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48671-0_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}