{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:43:53Z","timestamp":1725525833111},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/avss.2015.7301788","type":"proceedings-article","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T22:20:00Z","timestamp":1445898000000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Meeting detection in video through semantic analysis"],"prefix":"10.1109","author":[{"given":"Luis","family":"Patino","sequence":"first","affiliation":[]},{"given":"James","family":"Ferryman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2012.50"},{"key":"ref11","first-page":"452","author":"pellegrini","year":"2010","journal-title":"Computer Vision ECCV 2010 Volume 6311 of Lecture Notes in Computer Science"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2014.02.005"},{"key":"ref13","first-page":"75","article-title":"Detecting abandoned luggage items in a public space","author":"smith","year":"2006","journal-title":"PETS 2006"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2011.6130338"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995468"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2012.1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2010.83"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.220"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/CVPRW.2012.6239351","article-title":"Understanding dyadic interactions applying proxemic theory on video surveillance trajectories","author":"calderara","year":"2012","journal-title":"Computer Vision and Pattern Recognition Workshops (CVPRW) 2012 IEEE Computer Society Conference on"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BF03037383"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1006\/cviu.2000.0896"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/34.868684"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/34.192463"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2014.2353641"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1877937.1877941"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi:20070062"}],"event":{"name":"2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)","start":{"date-parts":[[2015,8,25]]},"location":"Karlsruhe, Germany","end":{"date-parts":[[2015,8,28]]}},"container-title":["2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7295687\/7301715\/07301788.pdf?arnumber=7301788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T16:10:29Z","timestamp":1602691829000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7301788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/avss.2015.7301788","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}