{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:04:02Z","timestamp":1729616642515,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/cisda.2012.6291529","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T15:58:22Z","timestamp":1347033502000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["A comparison of adaptive matchers for screening of faces in video surveillance"],"prefix":"10.1109","author":[{"given":"Miguel","family":"De-la-Torre","sequence":"first","affiliation":[]},{"given":"Paulo V. W.","family":"Radtke","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Granger","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Sabourin","sequence":"additional","affiliation":[]},{"given":"Dmitry O.","family":"Gorodnichy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.03.006"},{"key":"22","first-page":"123","article-title":"Precision-recall operating characteristic (proc) curves in imprecise environments","author":"landgrebe","year":"0","journal-title":"Proc ICPR 2006"},{"key":"17","first-page":"497","article-title":"Learn++: An incremental learning algorithm for mlp networks","volume":"31","author":"polikar","year":"2001","journal-title":"IEEE TRANS ON SMC"},{"key":"23","first-page":"1351","article-title":"Sheep, goats, lambs and wolves: A statistical analysis of speaker performance","author":"doddington","year":"0","journal-title":"International Conference on Spoken Language Processing 1998"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2012.6252658"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/34.254061"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19950545"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2002.1037958"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69939-2_7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-009-0381-x"},{"key":"12","first-page":"447","author":"roli","year":"2008","journal-title":"Adaptive Biometric Systems That Can Improve with Use"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017623"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2009.01.002"},{"key":"20","first-page":"2640","article-title":"Evaluating the performance of dnpso in dynamic environments","author":"nickabadi","year":"0","journal-title":"Proceedings on IEEE ICSMC Singapore Singapore 2008"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/954339.954342"},{"key":"1","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/11564386_20","article-title":"The CMU Face in Action (FIA) Database","author":"goh","year":"2005","journal-title":"Analysis and Modelling of Faces and Gestures"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.68"},{"key":"7","doi-asserted-by":"crossref","first-page":"1686","DOI":"10.1109\/TPAMI.2005.224","article-title":"Open set face recognition using transduction","volume":"27","author":"li","year":"2005","journal-title":"IEEE Trans on PAMI"},{"journal-title":"Biometric Recognition Challenges and Opportunities","year":"2010","author":"pato","key":"6"},{"journal-title":"Adaptive Biometric System Based on Template Update Procedures","year":"2010","author":"rattani","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2010.5585941"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2009.06.009"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.03.010"}],"event":{"name":"2012 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2012,7,11]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2012,7,13]]}},"container-title":["2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6279634\/6291498\/06291529.pdf?arnumber=6291529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T19:54:32Z","timestamp":1497988472000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6291529\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cisda.2012.6291529","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}