{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T13:10:07Z","timestamp":1749993007028,"version":"3.41.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/ssci.2016.7850118","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:24:33Z","timestamp":1487283873000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["A symbolic framework for recognizing activities in full motion surveillance videos"],"prefix":"10.1109","author":[{"given":"Manohar","family":"Karki","sequence":"first","affiliation":[]},{"given":"Saikat","family":"Basu","sequence":"additional","affiliation":[]},{"given":"Robert","family":"DiBiano","sequence":"additional","affiliation":[]},{"given":"Supratik","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Jerry","family":"Weltman","sequence":"additional","affiliation":[]},{"given":"Malcolm","family":"Stagg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.147"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.5244\/C.23.124"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2008.4761434"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995707"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1026711.1026749"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459154"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2006.242"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2011.2129870"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2005.1577271"},{"journal-title":"Finite Model Theory","year":"2005","author":"ebbinghaus","key":"ref16"},{"key":"ref17","first-page":"568","article-title":"Two-stream convolutional networks for action recognition in videos","author":"simonyan","year":"2014","journal-title":"Advances in neural information processing systems"},{"key":"ref18","first-page":"647","article-title":"Decaf: A deep convolutional activation feature for generic visual recognition","author":"donahue","year":"2014","journal-title":"ICML"},{"key":"ref19","article-title":"Beyond short snippets: Deep networks for video classification","author":"ng","year":"2015","journal-title":"IEEE Conference on ComputerVision and Pattern Recognition (CVPR)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_32"},{"journal-title":"Introduction to Automata Theory Languages and Computation","year":"1979","author":"hopcroft","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MMUL.2007.3","article-title":"Automated visual surveillance in realistic scenarios","volume":"14","author":"shah","year":"2007","journal-title":"IEEE Multimedia"},{"key":"ref6","article-title":"Logic meets algebra: The case of regular languages","author":"tesson","year":"2005","journal-title":"Proc LICS"},{"article-title":"Mosift: Recognizing human actions in surveillance videos","year":"2009","author":"chen","key":"ref29"},{"key":"ref5","article-title":"Approximate regular expression matching","author":"muzatko","year":"1996","journal-title":"Czech Technical University Tech Rep"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334462"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995586"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1922649.1922653"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995672"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2005594"},{"key":"ref20","article-title":"Video activity recognition in the real world","author":"hoogs","year":"2008","journal-title":"Proceedings of AAAI"},{"key":"ref22","first-page":"610","article-title":"Event modeling and recognition using markov logic networks","author":"tran","year":"2008","journal-title":"ECCV"},{"key":"ref21","first-page":"532","article-title":"Knowledge based activity recognition with dynamic bayesian network","author":"zeng","year":"2010","journal-title":"ECCV"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00167"},{"key":"ref23","first-page":"45","article-title":"On the implementation of finite state machines","author":"van gurp","year":"2000","journal-title":"Variability in Software Systems the Key to Software Reuse"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WORV.2013.6521926"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v24i1.7726","article-title":"Unsupervised learning of event classes from video","author":"sridhar","year":"2010","journal-title":"AAAI"}],"event":{"name":"2016 IEEE Symposium Series on Computational Intelligence (SSCI)","start":{"date-parts":[[2016,12,6]]},"location":"Athens, Greece","end":{"date-parts":[[2016,12,9]]}},"container-title":["2016 IEEE Symposium Series on Computational Intelligence (SSCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7840087\/7849361\/07850118.pdf?arnumber=7850118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T12:42:34Z","timestamp":1749991354000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7850118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/ssci.2016.7850118","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}