{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T22:28:43Z","timestamp":1679524123712},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2016,7,13]],"date-time":"2016-07-13T00:00:00Z","timestamp":1468368000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s11042-016-3752-0","type":"journal-article","created":{"date-parts":[[2016,7,13]],"date-time":"2016-07-13T04:58:53Z","timestamp":1468385933000},"page":"13315-13342","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Video traffic analytics for large scale surveillance"],"prefix":"10.1007","volume":"76","author":[{"given":"Soumen","family":"Kanrar","sequence":"first","affiliation":[]},{"given":"Niranjan Kumar","family":"Mandal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,13]]},"reference":[{"key":"3752_CR1","doi-asserted-by":"publisher","unstructured":"Annapureddy S et al. (2007) Explorng VoD in swarming system, IEEE INFOCOM 2007, p 2571\u20132575, doi: 10.1109\/INFCOM.2007.323","DOI":"10.1109\/INFCOM.2007.323"},{"key":"3752_CR2","doi-asserted-by":"publisher","unstructured":"Asit D et al. (1994) Scheduling polices for an on demand video server with batching. Proc Multimed:15\u201323 doi: 10.1145\/192593.192614","DOI":"10.1145\/192593.192614"},{"key":"3752_CR3","doi-asserted-by":"crossref","unstructured":"Atrey PK, Kankanhalli MS, Jain R (2006) A framework for information assimilation in multimedia surveillance systems. ACM Multimed Syst J","DOI":"10.1145\/1099396.1099416"},{"key":"3752_CR4","unstructured":"Atrey PK, Kankanhalli MS, Saddik A E (2007) Confidence building among correlated streams in multimedia surveillance systems. MMM 2007, LNCS 4352, Part II, p 155\u2013164"},{"issue":"1","key":"3752_CR5","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s11134-012-9277-y","volume":"71","author":"U Ayesta","year":"2012","unstructured":"Ayesta U et al (2012) Sojourn times in a processor sharingqueue with multiple vacations. Queueing Syst 71(1):53\u201378","journal-title":"Queueing Syst"},{"key":"3752_CR6","doi-asserted-by":"crossref","unstructured":"Bird ND, Masoud O, Papanikolopoulos NP, Isaacs A (Jun. 2005) Detection of loitering individuals in public transportation areas. IEEE Trans Intell Transp Syst 6(2):167\u2013177","DOI":"10.1109\/TITS.2005.848370"},{"key":"3752_CR7","doi-asserted-by":"publisher","unstructured":"Bramberger M et al. (2014) Real-time video analysis on an embedded smart camera for traffic surveillance, 10th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS\u201904),p 174\u2013181. doi: 10.1109\/rttas.2004.1317262","DOI":"10.1109\/rttas.2004.1317262"},{"key":"3752_CR8","doi-asserted-by":"crossref","unstructured":"Coifman B, Beymer D, McLauchlan P, Malik J (1998) Areal time computer vision system for vehicle tracking and traffic surveillance. Trans Res Part -C 6:271\u2013288. Elsevier Science","DOI":"10.1016\/S0968-090X(98)00019-9"},{"key":"3752_CR9","unstructured":"Collins R et al (2000) A system for video surveillance and monitoring, VSAM Final Report, Technical Report, CMURI-TR-00-12"},{"key":"3752_CR10","doi-asserted-by":"crossref","unstructured":"Dufaux F, Ebrahimi T (2006) Scrambling for video surveillance with privacy. Proc. IEEE Workshop on Privacy Research in Vision, New York, NY","DOI":"10.1109\/CVPRW.2006.184"},{"issue":"2","key":"3752_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2005.1406476","volume":"22","author":"A Hampapur","year":"2005","unstructured":"Hampapur A et al (2005) Smart video surveillance, exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Process Mag 22(2):38\u201351. doi: 10.1109\/MSP.2005.1406476","journal-title":"IEEE Signal Process Mag"},{"key":"3752_CR12","doi-asserted-by":"publisher","unstructured":"Heartwell CH et al (2002) Critical asset protection, perimeter monitoring, and threat detection using automated video surveillance \u2013a technology overview with case studies, Proceedings. 36th Annual 2002 International Carnahan Conference on Security Technology. doi: 10.1109\/CCST.2002.1049231","DOI":"10.1109\/CCST.2002.1049231"},{"issue":"10","key":"3752_CR13","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1016\/j.aeue.2014.04.011","volume":"68","author":"D Jiang","year":"2014","unstructured":"Jiang D et al (2014) How to reconstruct end \u2013to-end traffic based on time-frequency analysis and artificial neural network. AEU - Int J Electron Commun 68(10):915\u2013925","journal-title":"AEU - Int J Electron Commun"},{"key":"3752_CR14","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1016\/j.jnca.2013.09.014","volume":"40","author":"D Jiang","year":"2014","unstructured":"Jiang D et al (2014) A transform domain\u00adbased anomaly detection approach to network \u00adwide traffic. J Netw Comput Appl 40:292\u2013306","journal-title":"J Netw Comput Appl"},{"issue":"9","key":"3752_CR15","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/s12243-015-0465-8","volume":"70","author":"D Jiang","year":"2015","unstructured":"Jiang D et al (2015) A novel hybrid prediction algorithm to network traffic. Ann Telecommun 70(9):427\u2013439","journal-title":"Ann Telecommun"},{"key":"3752_CR16","doi-asserted-by":"crossref","unstructured":"Junejo IN, Javed O, Shah M (2004) Multi feature path modeling for video surveillance. Int Conf Pattern Recogn:716\u2013719","DOI":"10.1109\/ICPR.2004.1334359"},{"key":"3752_CR17","doi-asserted-by":"crossref","unstructured":"Junejo IN, Javed O, Shah M (2004) Multi feature path modeling for video surveillance. In Int Conf Pattern Recog, Cambridge, England, UK, p 716\u2013719","DOI":"10.1109\/ICPR.2004.1334359"},{"key":"3752_CR18","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/ReTIS.2011.6146839","volume":"2011","author":"S Kanrar","year":"2011","unstructured":"Kanrar S (2011) Performance of distributed video on demand system for multirate traffic. Int Conf ReTIS 2011:52\u201356. doi: 10.1109\/ReTIS.2011.6146839","journal-title":"Int Conf ReTIS"},{"key":"3752_CR19","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-319-07350-7_51","volume":"2","author":"S Kanrar","year":"2014","unstructured":"Kanrar S, Mandal NK (2014) Dynamic page replacement at the cache memory for the video on demand server. Adv Comput Netw Inform 2:461\u2013469. doi: 10.1007\/978-3-319-07350-7_51","journal-title":"Adv Comput Netw Inform"},{"key":"3752_CR20","doi-asserted-by":"publisher","unstructured":"Kanrar S et al (2015) Text and language independent speaker identification by GMM based I vector. ICCCT\u201815\u2013ACM proceeding, p 95\u2013100. doi: 10.1145\/2818567.2818585","DOI":"10.1145\/2818567.2818585"},{"key":"3752_CR21","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-81-322-2250-7_3","volume":"339","author":"S Kanrar","year":"2015","unstructured":"Kanrar S et al (2015) Detect mimicry by enhancing the speaker recognition system. Adv Intell Syst Comput 339:21\u201331. doi: 10.1007\/978-81-322-2250-7_3","journal-title":"Adv Intell Syst Comput"},{"key":"3752_CR22","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-81-322-2695-6_9","volume":"404","author":"S Kanrar","year":"2015","unstructured":"Kanrar S (2015) Impact of threshold to identify vocal tract. Adv Intell Syst Comput 404:97\u2013105. doi: 10.1007\/978-81-322-2695-6_9","journal-title":"Adv Intell Syst Comput"},{"key":"3752_CR23","doi-asserted-by":"crossref","unstructured":"Khoshabeh R, Gandhi T, Trivedi MM (2007) Multi camera based traffic flow characterization and classification. IEEEConf. Intell. Transport. Syst, p 259\u2013264, Seattle,WA","DOI":"10.1109\/ITSC.2007.4357750"},{"issue":"2","key":"3752_CR24","doi-asserted-by":"crossref","first-page":"027202","DOI":"10.1117\/1.3542038","volume":"50","author":"S Kwak","year":"2011","unstructured":"Kwak S, Byun H (2011) Detection of dominant flow and abnormal events in surveillance video. Opt Eng 50(2):027202","journal-title":"Opt Eng"},{"issue":"12","key":"3752_CR25","doi-asserted-by":"crossref","first-page":"1352","DOI":"10.1109\/TC.2001.970573","volume":"50","author":"D Lee","year":"2001","unstructured":"Lee D et al (2001) LRFU: a spectrum of polices that subsumes the least recently used and least frequently used polices. IEEE Trans Comput 50(12):1352\u20131361","journal-title":"IEEE Trans Comput"},{"key":"3752_CR26","unstructured":"Li VOK, Liao W (2003) Interactive video-on-demand system, Patent US 6543053 B1, Publication"},{"key":"3752_CR27","doi-asserted-by":"crossref","unstructured":"Liao H.-Y.M, Chen D.-T, Su C.-W, Tyan H.-R (2006) Real-time event detection and its application to surveillance systems. IEEE Int Symp Circuits Syst:509\u2013512","DOI":"10.1109\/ISCAS.2006.1692634"},{"key":"3752_CR28","unstructured":"Lu N et al. (2008) An improved motion detection method for real-time surveillance. Proc. of IAENG International Journal of Computer Science (1):1\u201316"},{"issue":"3","key":"3752_CR29","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TSMCB.2005.846652","volume":"35","author":"D Makris","year":"2005","unstructured":"Makris D, Ellis T (2005) Learning semantic scene models from ob-serving activity in visual surveillance. IEEE Trans Syst Man Cy-bernB 35(3):397\u2013408","journal-title":"IEEE Trans Syst Man Cy-bernB"},{"issue":"3","key":"3752_CR30","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TITS.2008.922970","volume":"9","author":"BT Morris","year":"2008","unstructured":"Morris BT, Trivedi MM (2008) Learning, modeling, and classification of vehicle track patterns from live video. IEEE Trans Intell Transp Syst 9(3):425\u2013437","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"3752_CR31","doi-asserted-by":"crossref","first-page":"1667","DOI":"10.1109\/TITS.2012.2208222","volume":"13","author":"BT Morris","year":"2012","unstructured":"Morris BT et al (2012) Real-time video-based traffic measurement and visualization system for energy\/emissions. IEEE Trans Intell Transp Syst 13(4):1667\u20131678","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"3752_CR32","doi-asserted-by":"crossref","unstructured":"Muller-Schneiders S, Jager T, Loos H, Niem W (2005) Performance evaluation of a real time video surveillance system. Proc. of 2nd Joint IEEE Int. Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance (VS-PETS), p 137\u2013144","DOI":"10.1109\/VSPETS.2005.1570908"},{"issue":"5","key":"3752_CR33","doi-asserted-by":"crossref","first-page":"1422","DOI":"10.1016\/j.compeleceng.2013.04.002","volume":"39","author":"L Nie","year":"2013","unstructured":"Nie L et al (2013) A compressive sensing-based reconstruction approach to network traffic. Comput Electr Eng 39(5):1422\u20131432","journal-title":"Comput Electr Eng"},{"key":"3752_CR34","unstructured":"Oner Sebe I et al. (2003) 3D Video surveillance with augmented virtual environments. ACM proceeding IWVS\u201903"},{"key":"3752_CR35","doi-asserted-by":"crossref","unstructured":"Remagnino P, Velastin SA, Foresti GL, Trivedi M (Aug. 2007) Novel concepts and challenges for the next generation of video surveillance systems. Mach Vis Appl 18(3\u20134):135\u2013137","DOI":"10.1007\/s00138-006-0059-6"},{"issue":"8","key":"3752_CR36","doi-asserted-by":"publisher","first-page":"1472","DOI":"10.1109\/TPAMI.2008.175","volume":"31","author":"I Saleemi","year":"2009","unstructured":"Saleemi I, Shafique K, Shah M (2009) Probabilistic modeling of scene dynamics for applications in visual surveillance. IEEE Trans Pattern Anal Mach Intell 31(8):1472\u20131485. doi: 10.1109\/TPAMI.2008.175","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"3752_CR37","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1177\/097492841006600403","volume":"66","author":"R Saroj Kumar","year":"2010","unstructured":"Saroj Kumar R (2010) New terror architecture in South Asia 26\/11 Mumbai attacks inquiry. J Int Aff (India Quarterly) 66(4):359\u2013381. doi: 10.1177\/097492841006600403","journal-title":"J Int Aff (India Quarterly)"},{"key":"3752_CR38","doi-asserted-by":"crossref","unstructured":"Saunier N, Sayed T, Lim C (2007) Probabilistic collision prediction for vision-based automated road safety analysis. IEEE Conf. Intell Transport Syst, Seattle, pp 872\u2013878, Washington","DOI":"10.1109\/ITSC.2007.4357793"},{"issue":"1","key":"3752_CR39","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MMUL.2007.3","volume":"14","author":"M Shah","year":"2007","unstructured":"Shah M et al (2007) Automated surveillance in realistic scenarios. IEEE Multi Media 14(1):30\u201339. doi: 10.1109\/MMUL.2007.3","journal-title":"IEEE Multi Media"},{"issue":"4","key":"3752_CR40","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TCSVT.2009.2035837","volume":"20","author":"H-P Shiang","year":"2010","unstructured":"Shiang H-P, van der Schaar M (2010) Information-constrained resource allocation in multicamera wireless surveillance networks. IEEE Trans Circ Syst Video Technol 20(4):505\u2013517. doi: 10.1109\/TCSVT.2009.2035837","journal-title":"IEEE Trans Circ Syst Video Technol"},{"issue":"6","key":"3752_CR41","doi-asserted-by":"publisher","first-page":"1819","DOI":"10.1109\/TNET.2009.2020162","volume":"17","author":"S Shrutivandana","year":"2009","unstructured":"Shrutivandana S, Demosthenis T (2009) Externalities-based decentralized optimal power allocation algorithm for wireless networks. IEEE\/ACM Trans Netw 17(6):1819\u20131831. doi: 10.1109\/TNET.2009.2020162","journal-title":"IEEE\/ACM Trans Netw"},{"key":"3752_CR42","doi-asserted-by":"publisher","unstructured":"Soumen K et al. (2016) Enhancement of video streaming in distributed hybrid architecture. Adv Multimed 2016, Article ID 5429187: 14, doi: 10.1155\/2016\/5429187","DOI":"10.1155\/2016\/5429187"},{"key":"3752_CR43","doi-asserted-by":"publisher","unstructured":"Soumen K et al. (2016) Video traffic flow analysis in distributed system during interactive session. Adv Multimed 2016, Article ID 7829570:14, doi: 10.1155\/2016\/7829570","DOI":"10.1155\/2016\/7829570"},{"key":"3752_CR44","unstructured":"Suh K, Diot C, Kurose J, Massouli\u00e9 L, Neumann C, Towsley D, Varvello M (2006) Push-to-peer video-on-demand system: design and evaluation. Technical Report CR-PRL-2006-11-0001, Thomson Research"},{"issue":"9","key":"3752_CR45","doi-asserted-by":"crossref","first-page":"1706","DOI":"10.1109\/JSAC.2007.071209","volume":"25","author":"K Suh","year":"2007","unstructured":"Suh K et al (2007) Push-to-peer video-on-demand system: design and evaluation. IEEE J Sel Areas Commun 25(9):1706\u20131716","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"3752_CR46","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1109\/tnet.2012.2208199","volume":"21","author":"B Tan","year":"2013","unstructured":"Tan B, Massoulie L (2013) Optimal content placement for peer-to-peer video-on-demand systems. Networking. IEEE\/ACM Trans Networking 21(2):566\u2013579. doi: 10.1109\/tnet.2012.2208199","journal-title":"IEEE\/ACM Trans Networking"},{"key":"3752_CR47","unstructured":"Turner-Fairbank-Highway Research Center (2013) Pedestrian and bicyclist intersection safety indices final report, http:\/\/www.fhwa.dot.gov\/publications\/research\/safety\/pedbike\/06125\/index.cfm"},{"issue":"6","key":"3752_CR48","doi-asserted-by":"crossref","first-page":"1099","DOI":"10.1109\/49.508281","volume":"14","author":"O Victor","year":"1996","unstructured":"Victor O, Li K et al (1996) Performance model of interactive video-on-demand systerns. IEEE J Sel Areas Commun 14(6):1099\u20131109","journal-title":"IEEE J Sel Areas Commun"},{"key":"3752_CR49","doi-asserted-by":"crossref","unstructured":"Yoshitaka A, Sawada K (2012) Personalized video summarization based on behavior of viewers. In Eighth international conference on signal Image Technology and Internet Based Systems:1\u20137","DOI":"10.1109\/SITIS.2012.100"},{"key":"3752_CR50","doi-asserted-by":"crossref","unstructured":"Yu H et al. (2006) Understanding user behavior in large scale video-on-demand systems. ACM proceeding Euro Sys, Leuven, Belgium 06","DOI":"10.1145\/1217935.1217968"},{"issue":"5","key":"3752_CR51","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TMC.2011.115","volume":"11","author":"D Yunus","year":"2012","unstructured":"Yunus D, Atay O, Cem E (2012) Distributed and Online Fair Resource Managment in Video Surveillance Sensor Networks. IEEE Trans Mob Comput 11(5):835\u2013848. doi: 10.1109\/TMC.2011.115","journal-title":"IEEE Trans Mob Comput"},{"key":"3752_CR52","doi-asserted-by":"publisher","unstructured":"Zhang X, Liu J, Li B, Yum T (2005) Cool Streaming\/DONet: a data driven overlay network for live media streaming. In Proc. IEEE 3:2102\u20132111. doi: 10.1109\/INFCOM.2005.1498486","DOI":"10.1109\/INFCOM.2005.1498486"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3752-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3752-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3752-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3752-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T22:56:07Z","timestamp":1568156167000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3752-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,13]]},"references-count":52,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["3752"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3752-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,13]]}}}