{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:03:48Z","timestamp":1729677828269,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/iccvw.2011.6130265","type":"proceedings-article","created":{"date-parts":[[2012,1,18]],"date-time":"2012-01-18T20:02:42Z","timestamp":1326916962000},"page":"367-374","source":"Crossref","is-referenced-by-count":12,"title":["Multiple Hypothesis Tracking in camera networks"],"prefix":"10.1109","author":[{"given":"David M.","family":"Antunes","sequence":"first","affiliation":[]},{"given":"Dario","family":"Figueira","sequence":"additional","affiliation":[]},{"given":"David M.","family":"Matos","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Bernardino","sequence":"additional","affiliation":[]},{"given":"Jose","family":"Gaspar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"26","article-title":"Tracking on a graph","author":"oh","year":"2005","journal-title":"IPSN 05 Pro-ceedings of the 4th International Symposium on Information Processing in Sensor Networks"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-010-0347-5"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/IROS.2006.282614"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2003.1238451"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.5244\/C.19.39"},{"key":"14","first-page":"962","article-title":"W4: A real time system for detecting and tracking people. Computer Vision and Pattern Recognition","volume":"0","author":"haritaoglu","year":"1998","journal-title":"IEEE Computer Society Confer-ence on"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1049\/ip-rsn:20050041"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-21593-3_30","article-title":"Re-identification of visual targets in camera networks a comparison of techniques","author":"figueira","year":"2011","journal-title":"International Conference on Image Analysis and Recog-nition"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1979.1102177"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSC.2008.4635689"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1999.784637"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.04.001"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04146-4_21"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995598"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2009.934469"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-21596-4_18","article-title":"Person re-identification using appearance classification","author":"aziz","year":"2011","journal-title":"International Conference on Image Analysis and Recognition"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1994.576318"},{"journal-title":"A Library for Implementing the Multiple Hypothesis Tracking Algorithm","year":"2011","author":"antunes","key":"1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MAES.2004.1263228"},{"journal-title":"Design and Analysis of Modern Tracking Systems","year":"1999","author":"blackman","key":"6"},{"key":"5","first-page":"1806","article-title":"Object reidentification in real world scenarios across multiple non-overlapping cameras","author":"berdugo","year":"2010","journal-title":"14th European Signal Processing Conference"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2007.09.014"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"9"},{"key":"8","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.1109\/5.959337","article-title":"Into theWoods: Visual Surveillance of Noncooperative and Camouflaged Targets in Complex Outdoor Settings","volume":"89","author":"boult","year":"2001","journal-title":"Proceed-ings of the IEEE"}],"event":{"name":"2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)","start":{"date-parts":[[2011,11,6]]},"location":"Barcelona, Spain","end":{"date-parts":[[2011,11,13]]}},"container-title":["2011 IEEE International Conference on Computer Vision Workshops (ICCV Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6114268\/6130192\/06130265.pdf?arnumber=6130265","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T13:22:33Z","timestamp":1561209753000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6130265\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccvw.2011.6130265","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}