{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:00:54Z","timestamp":1761058854103,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/icdsc.2008.4635687","type":"proceedings-article","created":{"date-parts":[[2008,9,30]],"date-time":"2008-09-30T15:27:26Z","timestamp":1222788446000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Bypassing BigBackground: An efficient hybrid background modeling algorithm for embedded video surveillance"],"prefix":"10.1109","author":[{"given":"Brian","family":"Valentine","sequence":"first","affiliation":[]},{"family":"Jee Choi","sequence":"additional","affiliation":[]},{"given":"Senyo","family":"Apewokin","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Wills","sequence":"additional","affiliation":[]},{"given":"Scott","family":"Wills","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2004.1400815"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/34.868677"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2005.248578"},{"year":"0","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"14","first-page":"281","article-title":"some methods for classification and analysis of multivariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Proceedings of 5-th Berkeley Symposium on Mathematical Statistics and Probability"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/331499.331504"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/34.868688"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1535\/itj.0902.02"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383418"},{"key":"1","article-title":"midground object detection in real world video scenes","author":"apewokin","year":"2007","journal-title":"Proc IEEE Conf Advanced Video and Signal Based Surveillance"},{"year":"0","key":"10"},{"journal-title":"Introduction to statistical pattern recognition","year":"1972","author":"fukunaga","key":"7"},{"journal-title":"VESA PC eBox-2300 Users Manual","year":"2006","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/34.1000236"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/965145.801294"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-050753-8.50061-9"}],"event":{"name":"2008 Second ACM\/IEEE International Conference on Distributed Smart Cameras (ICDSC)","start":{"date-parts":[[2008,9,7]]},"location":"Palo Alto, CA, USA","end":{"date-parts":[[2008,9,11]]}},"container-title":["2008 Second ACM\/IEEE International Conference on Distributed Smart Cameras"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4629334\/4635670\/04635687.pdf?arnumber=4635687","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:14:27Z","timestamp":1489763667000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4635687\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icdsc.2008.4635687","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}