{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:39:05Z","timestamp":1729622345093,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/ciss.2015.7086888","type":"proceedings-article","created":{"date-parts":[[2015,4,16]],"date-time":"2015-04-16T15:16:48Z","timestamp":1429197408000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["&amp;#x201C;Am I your sibling?&amp;#x201D; Inferring kinship cues from facial image pairs"],"prefix":"10.1109","author":[{"given":"Sherin M","family":"Mathews","sequence":"first","affiliation":[]},{"given":"Chandra","family":"Kambhamettu","sequence":"additional","affiliation":[]},{"given":"Kenneth E.","family":"Barner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2010.5652590"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2012.6374564"},{"key":"ref12","first-page":"2539","article-title":"Kinship verification through transfer learning","volume":"22","author":"xia","year":"2011","journal-title":"IJCAI Proceedings-International Joint Conference on Artificial Intelligence"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.134"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2376934"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738614"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2014.735"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2013.189"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s00371-013-0884-3"},{"key":"ref19","first-page":"1753","article-title":"Face recognition using DCT coefficients selection","author":"de","year":"2008","journal-title":"Proceedings of the ACM Symposium on Applied Computing"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.evolhumbehav.2007.01.002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8721.01235"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2006.0366"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s12110-005-1012-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1098\/rspb.2009.0677"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2008.09.025"},{"key":"ref2","article-title":"The Self","author":"baumeister","year":"1998","journal-title":"The Handbook of Social Psychology"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1167\/9.6.23"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-5193(64)90039-6"},{"key":"ref20","first-page":"19","article-title":"Handwritten character recognition using gradient feature and quadratic classifier with multiple discrimination schemes","author":"liu","year":"2005","journal-title":"Eighth International Conference on Document Analysis and Recog-nition IEEE"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.884954"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.5373791"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ECS.2014.6892800"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03092-0_17"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"282","DOI":"10.4156\/aiss.vol4.issue2.35","article-title":"Study on genetic algorithm optimization for support vector machine in network intrusion detection","volume":"4","author":"xiaoqiang","year":"2012","journal-title":"Advances in Information Sciences and Service Sciences"}],"event":{"name":"2015 49th Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2015,3,18]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2015,3,20]]}},"container-title":["2015 49th Annual Conference on Information Sciences and Systems (CISS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7075844\/7086424\/07086888.pdf?arnumber=7086888","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T05:35:53Z","timestamp":1498196153000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7086888\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/ciss.2015.7086888","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}