{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:57:40Z","timestamp":1729630660878,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/btas.2010.5634495","type":"proceedings-article","created":{"date-parts":[[2010,11,19]],"date-time":"2010-11-19T21:30:10Z","timestamp":1290202210000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Writer recognition of Arabic text by generative local features"],"prefix":"10.1109","author":[{"given":"Jeffrey","family":"Woodard","sequence":"first","affiliation":[]},{"given":"Mark","family":"Lancaster","sequence":"additional","affiliation":[]},{"given":"Amlan","family":"Kundu","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Ruiz","sequence":"additional","affiliation":[]},{"given":"John","family":"Ryan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Fingerprint verification using SIFT features","volume":"6944","author":"park","year":"2008","journal-title":"Proceedings of SPIE"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.188"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-005-3848-x"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2001.990541"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2007.367295"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790410"},{"key":"11","first-page":"914","article-title":"Learning the similarity of documents","volume":"12","author":"hofmann","year":"2000","journal-title":"Advances in Neural Information Processing Systems Systems"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007617005950"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1214\/10-AOAS379"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2009.5202522"},{"journal-title":"Discovering Object Categories in Image Collections","year":"2005","author":"sivic","key":"22"},{"key":"23","article-title":"Video data mining using configurations of viewpoint invariant regions","author":"sivic","year":"2004","journal-title":"Proceedings IEEE Conference on Computer Vision and Pattern Recognition"},{"key":"24","article-title":"A system for handwriting matching and recognition","author":"srihari","year":"2003","journal-title":"Proceedings of the Symposium on Document Image Understanding Technology (SDIUT 03)"},{"key":"25","first-page":"1","article-title":"Questioned document examination using CEDAR-FOX","volume":"18","author":"srihari","year":"2007","journal-title":"J Forensic Document Examination"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1561\/0600000017"},{"journal-title":"Vlfeat An Open and Portable Library of Computer Vision Algorithms","year":"2008","author":"vedaldi","key":"27"},{"key":"28","article-title":"Building Arabic language training and testing sets","author":"walch","year":"2005","journal-title":"Proceedings Symposium on Document Image Understanding Technology (SDIUT 05)"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/CCPR.2009.5344055"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1009"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2008.07.004"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1815330.1815376"},{"key":"7","first-page":"197","article-title":"Multi-language handwriting derived biometric identification","author":"gantz","year":"2005","journal-title":"Proceedings 2005 Symposium on Document Image Understanding Technology"},{"key":"6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm","volume":"39","author":"dempster","year":"1977","journal-title":"Journal of the Royal Statistical Society Series B (Methodological)"},{"key":"5","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/3-540-44522-6_13","article-title":"Writer identification: Statistical analysis and dichotomizer","volume":"1876","author":"cha","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"4","first-page":"517","article-title":"Scene classification via pLSA","volume":"3954","author":"bosch","year":"2006","journal-title":"Proceedings of the European Conference on Computer Vision"},{"key":"9","article-title":"Correlated topic models for image retrieval","author":"greif","year":"2008","journal-title":"Technical Report TR2008-09 University of Augsburg"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-3626-0"}],"event":{"name":"2010 IEEE Fourth International Conference On Biometrics: Theory, Applications And Systems (BTAS)","start":{"date-parts":[[2010,9,27]]},"location":"Washington, DC, USA","end":{"date-parts":[[2010,9,29]]}},"container-title":["2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5618724\/5634461\/05634495.pdf?arnumber=5634495","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T11:34:24Z","timestamp":1559820864000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5634495\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/btas.2010.5634495","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}