{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T04:39:15Z","timestamp":1722919155097},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icsmc.2003.1243902","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T16:27:43Z","timestamp":1087921663000},"page":"737-743","source":"Crossref","is-referenced-by-count":0,"title":["Combining gabor features: Summing vs.voting in human face recognition"],"prefix":"10.1109","volume":"1","author":[{"family":"Xisoyan Mu","sequence":"first","affiliation":[]},{"given":"M.H.","family":"Hassoun","sequence":"additional","affiliation":[]},{"given":"P.","family":"Watta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1142\/1802","article-title":"Handbook of Pattern Recognition and Computer Vision","author":"chen","year":"1993"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1117\/12.172407"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/34.598235"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(01)00089-2"},{"key":"ref11","article-title":"Face Recognition by Elastic Bunch Graph Matching","author":"wiskott","year":"1999","journal-title":"Intelligent Biometric Techniques in Fingerprint and Face Recognition"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(02)00366-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(98)00122-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0262-8856(97)00070-X"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/34.879790"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1117\/12.172408"},{"key":"ref9","first-page":"465","article-title":"Construction and Analysis of a Database of Face Images which Requires Minimal Preprocessing","author":"watta","year":"2000","journal-title":"Proceedings of the IASTED Conference on Modeling and Simulation MS-2000"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.1999.836184"}],"event":{"name":"SMC'03 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)","acronym":"ICSMC-03","location":"Washington, DC, USA"},"container-title":["SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8811\/27871\/01243902.pdf?arnumber=1243902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,6,4]],"date-time":"2018-06-04T00:53:10Z","timestamp":1528073590000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1243902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2003.1243902","relation":{},"subject":[]}}