{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T19:41:16Z","timestamp":1775850076692,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/wacv.2014.6835995","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T20:51:07Z","timestamp":1406580667000},"page":"998-1005","source":"Crossref","is-referenced-by-count":32,"title":["Writer identification and verification using GMM supervectors"],"prefix":"10.1109","author":[{"given":"Vincent","family":"Christlein","sequence":"first","affiliation":[]},{"given":"David","family":"Bernecker","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Honig","sequence":"additional","affiliation":[]},{"given":"Elli","family":"Angelopoulou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383266"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.01.006"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2004.18"},{"key":"18","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s100320200071","article-title":"The iam-database: An english sentence database for offline handwriting recognition","volume":"5","author":"marti","year":"2002","journal-title":"International Journal on Document Analysis and Recognition"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.05.019"},{"key":"15","first-page":"560","author":"kleber","year":"2013","journal-title":"CVL-DataBase An Off-Line Database for Writer Retrieval Writer Identification and Word Spotting"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.282"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.115"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2011.235"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2013.114"},{"key":"12","first-page":"487","article-title":"Exploiting generative models in discriminative classifiers","author":"jaaakkola","year":"1999","journal-title":"Advances in Neural Information Processing Systems II"},{"key":"21","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1006\/dspr.1999.0361","article-title":"Speaker verification using adapted gaussian mixture models","volume":"10","author":"reynolds","year":"2000","journal-title":"Digital Signal Processing"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4517932"},{"key":"20","first-page":"143","article-title":"Improving the fisher kernel for large-scale image classification","author":"perronnin","year":"2010","journal-title":"European Conference on Computer Vision (ECCV)"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.207"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6248018"},{"key":"10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the em algorithm","volume":"39","author":"dempster","year":"1977","journal-title":"Journal of the Royal Statistical Society Series B (Methodological)"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2006.870086"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1009"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICIAP.2007.4362792"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.07.005"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2218597"},{"key":"8","first-page":"8712","article-title":"The impact of specular highlights on 3d-2d face recognition","volume":"1","author":"christlein","year":"2013","journal-title":"Defense Security + Sensing (Biometric and Surveillance Technology for Human and Activity Identification)"}],"event":{"name":"2014 IEEE Winter Conference on Applications of Computer Vision (WACV)","location":"Steamboat Springs, CO, USA","start":{"date-parts":[[2014,3,24]]},"end":{"date-parts":[[2014,3,26]]}},"container-title":["IEEE Winter Conference on Applications of Computer Vision"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6823792\/6835728\/06835995.pdf?arnumber=6835995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:56:46Z","timestamp":1602691006000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6835995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wacv.2014.6835995","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}