{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:09:31Z","timestamp":1729620571449,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/iisa.2017.8316373","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T20:46:49Z","timestamp":1521146809000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Object recognition for use in point-and-link communication"],"prefix":"10.1109","author":[{"given":"J.","family":"Ok","sequence":"first","affiliation":[]},{"given":"S.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"K.","family":"Lee","sequence":"additional","affiliation":[]},{"given":"S.","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Kim","sequence":"additional","affiliation":[]},{"given":"C.","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"2548","article-title":"BRISK: Binary Robust Invariant Scalable Key-points","author":"leutengger","year":"2011","journal-title":"Proc IEEE International Conf on Computer Vision"},{"key":"ref11","first-page":"510","article-title":"FREAK: Fast Retinal Key-point","author":"alahi","year":"2012","journal-title":"Proc IEEE Conf Computer Vision and Pattern Recognition"},{"key":"ref12","first-page":"589","article-title":"Face Recognition Based on Binary Images for Link Selection","author":"lee","year":"2014","journal-title":"9th International Conference on Computer Vision Theory and Applications"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1635","DOI":"10.1109\/TIP.2010.2042645","article-title":"Enhanced local texture feature sets for face recognition under difficult lighting conditions","volume":"19","author":"tan","year":"2010","journal-title":"IEEE Trans Image Process"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/76.767122"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/CVPR.1997.609415"},{"key":"ref16","article-title":"Communication Target Object Recognition for D2D Connection with Feature Size Limit","volume":"94110b","author":"ok","year":"2015","journal-title":"IS&T\/SPIE Electronic Imaging"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/ICCV.1998.710815"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/CBMI.2011.5972548"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TENCON.1999.818376"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/WCNC.2014.6952645"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SSP.2012.6319741"},{"key":"ref6","first-page":"511","article-title":"PCA-SIFT: A more distinctive representation for local image descriptors","author":"ke","year":"2004","journal-title":"Proc Conf Computer Vision and Pattern Recognition"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-642-15561-1_56"},{"key":"ref7","first-page":"404","article-title":"SURF: Speeded-Up Robust Features","author":"bay","year":"2006","journal-title":"Proc 9th European Conf on Computer Vision"},{"year":"2005","journal-title":"IEEE","article-title":"Part 15.1: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Wireless Personal Area Networks (WPANs)","key":"ref2"},{"year":"2012","journal-title":"IEEE","article-title":"Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICCV.2011.6126544"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TPAMI.2002.1017623"},{"year":"0","journal-title":"Opencv","key":"ref21"}],"event":{"name":"2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA)","start":{"date-parts":[[2017,8,27]]},"location":"Larnaca","end":{"date-parts":[[2017,8,30]]}},"container-title":["2017 8th International Conference on Information, Intelligence, Systems &amp; Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8308011\/8316350\/08316373.pdf?arnumber=8316373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T23:58:31Z","timestamp":1570924711000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8316373\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iisa.2017.8316373","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}