{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:00:49Z","timestamp":1729623649423,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cibim.2014.7015451","type":"proceedings-article","created":{"date-parts":[[2015,1,23]],"date-time":"2015-01-23T21:26:28Z","timestamp":1422048388000},"page":"110-117","source":"Crossref","is-referenced-by-count":7,"title":["Target-based evaluation of face recognition technology for video surveillance applications"],"prefix":"10.1109","author":[{"given":"Dmitry","family":"Gorodnichy","sequence":"first","affiliation":[]},{"given":"Eric","family":"Granger","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Benchmarking Still-to-Video Face Recognition via Partial and Local Linear Discriminant Analysis on COX-S2V Dataset","author":"huang","year":"2012","journal-title":"Proceeding of Asian Conference on Computer Vision"},{"journal-title":"ISO\/IEC SC 37 19795-2 2007 Biometric performance testing and reporting - Part 2 Testing methodologies for technology and scenario evaluation","year":"0","key":"ref11"},{"key":"ref12","article-title":"PROVE-IT(FRiV): framework and results","author":"gorodnichy","year":"2014","journal-title":"Proceedings of NIST International Biometric Performance Conference"},{"key":"ref13","first-page":"2014","article-title":"Survey of academic research and prototypes for face recognition in video","author":"granger","year":"0","journal-title":"CBSA Science and Engineering Directorate"},{"key":"ref14","article-title":"Survey of commercial technologies for face recognition in video","author":"gorodnichy","year":"0","journal-title":"CBSA Science and Engineering Directorate"},{"key":"ref15","first-page":"2014","article-title":"Evaluation methodology for face recognition technology in video surveillance applications","author":"granger","year":"0","journal-title":"Border Technology Division"},{"key":"ref16","article-title":"Results from evaluation of three commercial off-the-shelf face recognition systems on Chokepoint dataset","author":"granger","year":"0","journal-title":"Border Technology Division Division Report 2014-29 (TR)"},{"key":"ref17","article-title":"The Current State and TRL Assessment of People Tracking Technology for Video Surveillance applications","author":"macrini","year":"0","journal-title":"CBSA Science and Engineering Directorate Division Report 2014-14 (TR)"},{"key":"ref18","article-title":"Further refinement of multi-order biometric score analysis framework and its application to designing and evaluating biometric systems for access and border control","author":"gorodnichy","year":"2011","journal-title":"Proc IEEE SSSI CIBIM Workshop"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CIBIM.2014.7015452"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.68"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001412660024"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04667-4_5","article-title":"Open-set FR-based visitor interface system","author":"ekenel","year":"2009","journal-title":"Proceedings of the 7th International Conference on Computer Vision Systems Computer Vision Systems"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1686","DOI":"10.1109\/TPAMI.2005.224","article-title":"Open set FR using transduction","volume":"27","author":"li","year":"2005","journal-title":"Pattern Analysis and Machine Intelligence IEEE Transactions on"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2011.5981881"},{"key":"ref7","article-title":"Detector Ensembles for FR in Video Surveillance","author":"pagano","year":"2012","journal-title":"Proc of IEEE IJCNN"},{"key":"ref2","article-title":"A Case Study on Unconstrained Facial Recognition using the Boston Marathon","author":"klontz","year":"2013","journal-title":"Bombings Suspects Technical Report MSU-CS E-13-4"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2013.6712699"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/11564386_20","article-title":"The CMU Face in Action (FIA) Database","volume":"3723","author":"goh","year":"2005","journal-title":"Analysis and Modeling of Faces and Gestures Ser Lecture Notes in Computer Science"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04146-4_47"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.102"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2006.71"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2013.0269"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.941"}],"event":{"name":"2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)","start":{"date-parts":[[2014,12,9]]},"location":"Orlando, FL, USA","end":{"date-parts":[[2014,12,12]]}},"container-title":["2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7000190\/7011733\/07015451.pdf?arnumber=7015451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,19]],"date-time":"2019-08-19T23:04:55Z","timestamp":1566255895000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7015451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/cibim.2014.7015451","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}