{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T05:20:56Z","timestamp":1738473656961,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881919"},{"type":"electronic","value":"9783540881926"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88192-6_62","type":"book-chapter","created":{"date-parts":[[2008,9,29]],"date-time":"2008-09-29T08:05:59Z","timestamp":1222675559000},"page":"604-611","source":"Crossref","is-referenced-by-count":0,"title":["A Learning Method of Detecting Anomalous Pedestrian"],"prefix":"10.1007","author":[{"given":"Yue","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhijing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Chen, Y., Liang, G., Lee, K.K., Xu, Y.: Abnormal behavior detection by multi-SVM-based Bayesian network. In: Proc. int. conf. Information Acquisition, pp. 298\u2013303 (2007)","DOI":"10.1109\/ICIA.2007.4295746"},{"issue":"3","key":"62_CR2","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1109\/TSMCC.2004.829274","volume":"34","author":"W. Hu","year":"2004","unstructured":"Hu, W., Tan, T., Wang, L., Maybank, S.: A survey on visual surveillance of object motion and behaviors. IEEE Trans. System, Man, And Cybernetics\u00a034(3), 334\u2013352 (2004)","journal-title":"IEEE Trans. System, Man, And Cybernetics"},{"key":"62_CR3","unstructured":"Ghallab, M.: On Chronicles: Representation, On-line Recognition and Learning. In: 5th Int. Conf. on Principles of Knowledge Representation and Reasoning, Cambridge, pp. 597\u2013606 (1996)"},{"key":"62_CR4","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/0004-3702(85)90041-4","volume":"25","author":"A.K. Mackworth","year":"1985","unstructured":"Mackworth, A.K., Freuder, E.C.: The Complexity of Some Polynomial Network Consistency Algorithms for Satisfaction Problems. Artificial Intelligence\u00a025, 65\u201374 (1985)","journal-title":"Artificial Intelligence"},{"key":"62_CR5","doi-asserted-by":"crossref","unstructured":"Mecocci, A., Pannozzo, M., Fumarola, A.: Automatic Detection of Anomalous Behavioural Events for Advanced Real-Time Video Surveilance. In: Int. Symposium on Computational Intelligence for Measurement Systems and Applications, Lugano, pp. 187\u2013192 (2003)","DOI":"10.1109\/CIMSA.2003.1227225"},{"key":"62_CR6","doi-asserted-by":"crossref","unstructured":"Boiman, O., Irani, M.: Detecting irregularities in images and in video. In: Proc. IEEE Int. conf. Computer Vision, pp. 462\u2013469 (2005)","DOI":"10.1109\/ICCV.2005.70"},{"key":"62_CR7","doi-asserted-by":"crossref","unstructured":"Duque, D., Santos, H., Cortez, P.: Prediction of abnormal Behaviors for intelligent video surveillance system. In: Proc. IEEE Int. conf. Computational Intelligence and Data Mining, pp. 362\u2013367 (2007)","DOI":"10.1109\/CIDM.2007.368897"},{"key":"62_CR8","doi-asserted-by":"crossref","unstructured":"Fujiyoshi, H., Lipton, A.: Real-time human motion analysis by image skeletonization. In: Proc. IEEE Workshop on Applications of Computer Vision, Princeton, NJ, pp. 15\u201321 (1998)","DOI":"10.1109\/ACV.1998.732852"},{"issue":"1","key":"62_CR9","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"SMC-15","author":"T. Takagi","year":"1985","unstructured":"Takagi, T., Sugeno, M.: Fuzzy identification of systems and its applications to modeling and control. IEEE Trans. Syst., Man, Cybern.\u00a0SMC-15(1), 116\u2013132 (1985)","journal-title":"IEEE Trans. Syst., Man, Cybern."},{"issue":"93","key":"62_CR10","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1109\/TIP.2003.815251","volume":"12","author":"L. Wang","year":"2003","unstructured":"Wang, L., Tan, T., Hu, W., Ning, H.: Automatic Gait Recognition Based on Statistical Shape Analysis. IEEE Trans. Image Processing\u00a012(93), 1120\u20131131 (2003)","journal-title":"IEEE Trans. Image Processing"},{"key":"62_CR11","doi-asserted-by":"crossref","unstructured":"Boyd, J.: Video phase-locked loops in gait recognition. In: Proc. Int. Conf. Computer Vision (2001)","DOI":"10.1109\/ICCV.2001.937591"},{"key":"62_CR12","doi-asserted-by":"crossref","unstructured":"Birney, E.: Hidden Markov Models in Biological sequence analysis. IBM Journal of Research and Development\u00a045(3\/4) (2001)","DOI":"10.1147\/rd.453.0449"},{"key":"62_CR13","first-page":"295","volume-title":"Applied Research in Fuzzy Technology: Three Years of Research at the Laboratory for International Fuzzy Engineering (LIFE)","year":"1994","unstructured":"Ralescu, A.L. (ed.): Applied Research in Fuzzy Technology: Three Years of Research at the Laboratory for International Fuzzy Engineering (LIFE), Yokohama, Japan, pp. 295\u2013369. Kluwer, Norwell (1994)"},{"key":"62_CR14","unstructured":"Gonzalez, R.C., Woods, R.E.: Digital Image Processing, Publishing House of Electronics Industry (2002)"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88192-6_62.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T08:03:39Z","timestamp":1738397019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88192-6_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881919","9783540881926"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88192-6_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}