{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:17:41Z","timestamp":1760707061905,"version":"3.30.2"},"reference-count":30,"publisher":"Elsevier BV","issue":"9-10","license":[{"start":{"date-parts":[[2003,6,1]],"date-time":"2003-06-01T00:00:00Z","timestamp":1054425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pattern Recognition Letters"],"published-print":{"date-parts":[[2003,6]]},"DOI":"10.1016\/s0167-8655(02)00380-x","type":"journal-article","created":{"date-parts":[[2003,3,25]],"date-time":"2003-03-25T19:16:29Z","timestamp":1048619789000},"page":"1395-1407","source":"Crossref","is-referenced-by-count":34,"title":["A sequential pruning strategy for the selection of the number of states in hidden Markov models"],"prefix":"10.1016","volume":"24","author":[{"given":"Manuele","family":"Bicego","sequence":"first","affiliation":[]},{"given":"Vittorio","family":"Murino","sequence":"additional","affiliation":[]},{"given":"M\u00e1rio A.T.","family":"Figueiredo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-8655(02)00380-X_BIB1","doi-asserted-by":"crossref","unstructured":"Achermann, B., Bunke, H., 1996. Combination of face classifiers for person identification. In: Internat. Conf. on Pattern Recognition, pp. C416\u2013C420","DOI":"10.1109\/ICPR.1996.546981"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB2","first-page":"1","article-title":"An inequality and associated maximization technique in statistical estimation for probabilistic functions of Markov processes","volume":"3","author":"Baum","year":"1970","journal-title":"Inequality"},{"issue":"1","key":"10.1016\/S0167-8655(02)00380-X_BIB3","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1214\/aoms\/1177697196","article-title":"A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains","volume":"41","author":"Baum","year":"1970","journal-title":"Annals Math. Statist."},{"key":"10.1016\/S0167-8655(02)00380-X_BIB4","unstructured":"Bicego, M., Murino, V., submitted for publication. Investigating Hidden Markov Models\u2019 capabilities in 2D shape classification. IEEE Trans. Pattern Anal. Machine Intell"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB5","series-title":"Energy Minimization Methods in Computer Vision and Pattern Recognition","first-page":"75","article-title":"Designing the minimal structure of hidden Markov models by bisimulation","author":"Bicego","year":"2001"},{"year":"1995","series-title":"Neural Network for Pattern Recognition","author":"Bishop","key":"10.1016\/S0167-8655(02)00380-X_BIB6"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB7","article-title":"An entropic estimator for structure discovery","volume":"vol. 11","author":"Brand","year":"1999"},{"year":"1999","series-title":"Markov Chains","author":"Br\u00e9maud","key":"10.1016\/S0167-8655(02)00380-X_BIB8"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB9","first-page":"1","article-title":"Maximum likelihood from incomplete data via the EM algorithm","volume":"39","author":"Dempster","year":"1977","journal-title":"J. Roy. Statist. Soc. B"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB10","doi-asserted-by":"crossref","unstructured":"Eickeler, S., Kosmala, A., Rigoll, G. 1998. Hidden Markov Model based continuous online gesture recognition. In: IEEE Proc. Internat. Conf. on Pattern Recognition. vol. 2, pp. 1206\u20131208","DOI":"10.1109\/ICPR.1998.711914"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB11","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/S0262-8856(99)00055-4","article-title":"Recognition of JPEG compressed face images based on statistical methods","volume":"18","author":"Eickeler","year":"2000","journal-title":"Image Vision Comput."},{"key":"10.1016\/S0167-8655(02)00380-X_BIB12","series-title":"Energy Minimization Methods in Computer Vision and Pattern Recognition","first-page":"54","article-title":"On fitting mixture models","author":"Figueiredo","year":"1999"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB13","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/PROC.1973.9030","article-title":"The Viterbi algorithm","volume":"61","author":"Forney","year":"1973","journal-title":"Proc. IEEE"},{"issue":"10","key":"10.1016\/S0167-8655(02)00380-X_BIB14","doi-asserted-by":"crossref","first-page":"1039","DOI":"10.1109\/34.541414","article-title":"HMM based online handwriting recognition","volume":"18","author":"Hu","year":"1996","journal-title":"IEEE Trans. Pattern Anal. Machine Intell."},{"key":"10.1016\/S0167-8655(02)00380-X_BIB15","first-page":"95","article-title":"Hidden Markov Model for sequence analysis: Extension and analysis of the basic method","volume":"12","author":"Hughey","year":"1996","journal-title":"Comput. Appl. Biosci."},{"key":"10.1016\/S0167-8655(02)00380-X_BIB16","doi-asserted-by":"crossref","unstructured":"Jebara, T., Pentland, A., 1999. Action reaction learning: Automatic visual analysis and synthesis of interactive behavior. In: Proc. Internat. Conf. on Comput. Vision Systems","DOI":"10.1007\/3-540-49256-9_17"},{"issue":"2","key":"10.1016\/S0167-8655(02)00380-X_BIB17","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1109\/TIT.1986.1057145","article-title":"Maximum likelihood estimation for multivariate mixture observations of Markov chain","volume":"32","author":"Juang","year":"1986","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB18","doi-asserted-by":"crossref","unstructured":"Kohir, V.V., Desai, U.B., 1998. Face recognition using dct-hmm approach. In: Workshop on Advances in Facial Image Analysis and Recognition Technology (AFIART), Freiburg, Germany","DOI":"10.1109\/ACV.1998.732884"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB19","unstructured":"Li, D., Biem, A., Subrahmonia, J., 2001. HMM topology optimization for handwriting recognition. In: Proc. of IEEE Interna. Conf. on Acoust., Speech, and Signal Process, vol. 3. pp. 1521\u20131524"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB20","doi-asserted-by":"crossref","unstructured":"Nefian, A.V., Hayes, M.H., 1998. Hidden Markov models for face recognition. In: Proc. IEEE Internat. Conf. on Acoust., Speech and Signal Process. (ICASSP), Seattle, pp. 2721\u20132724","DOI":"10.1109\/ICASSP.1998.678085"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB21","series-title":"Proc. of 13th Internat. Conf. (ICML 96)","first-page":"364","article-title":"Unsupervised learning using MML in machine learning","author":"Oliver","year":"1996"},{"issue":"2","key":"10.1016\/S0167-8655(02)00380-X_BIB22","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","article-title":"A tutorial on hidden Markov models and selected applications in speech recognition","volume":"77","author":"Rabiner","year":"1989","journal-title":"Proc. of IEEE"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB23","doi-asserted-by":"crossref","first-page":"111","DOI":"10.2307\/271063","article-title":"Bayesian model selection in social research","author":"Raftery","year":"1995","journal-title":"Sociol. Methodol."},{"key":"10.1016\/S0167-8655(02)00380-X_BIB24","first-page":"14","article-title":"Stochastic complexity and modeling","author":"Rissanen","year":"1986","journal-title":"The Annals Statist."},{"key":"10.1016\/S0167-8655(02)00380-X_BIB25","unstructured":"Samaria, F., 1994. Face recognition using hidden markov models. Technical report, Ph.D. thesis, Engineering Department, Cambridge University"},{"issue":"2","key":"10.1016\/S0167-8655(02)00380-X_BIB26","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1214\/aos\/1176344136","article-title":"Estimating the dimension of a model","volume":"6","author":"Schwarz","year":"1978","journal-title":"Ann. Statist."},{"key":"10.1016\/S0167-8655(02)00380-X_BIB27","unstructured":"Sebastian, T., Klein, P., Kimia, B., 2001. Recognition of shapes by editing shock graphs. In: Proc. Internat. Conf. on Computer Vision, pp. 755\u2013762"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB28","first-page":"11","article-title":"Hidden Markov model induction by Bayesian model merging","volume":"5","author":"Stolcke","year":"1993"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB29","first-page":"111","article-title":"Cross-validatory choice and assessment of statistical predictions","volume":"36","author":"Stone","year":"1974","journal-title":"J. Roy. Statist. Soc. B"},{"key":"10.1016\/S0167-8655(02)00380-X_BIB30","unstructured":"Zimmermann, M., Bunke, H., 2001. Hidden Markov model length optimization for handwriting recognition systems. TR IAM-01-003 University of Bern"}],"container-title":["Pattern Recognition Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016786550200380X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016786550200380X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,11]],"date-time":"2020-03-11T22:42:14Z","timestamp":1583966534000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016786550200380X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,6]]},"references-count":30,"journal-issue":{"issue":"9-10","published-print":{"date-parts":[[2003,6]]}},"alternative-id":["S016786550200380X"],"URL":"https:\/\/doi.org\/10.1016\/s0167-8655(02)00380-x","relation":{},"ISSN":["0167-8655"],"issn-type":[{"type":"print","value":"0167-8655"}],"subject":[],"published":{"date-parts":[[2003,6]]}}}