{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:33:44Z","timestamp":1730266424215,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1109\/ijcnn.2019.8851929","type":"proceedings-article","created":{"date-parts":[[2019,9,30]],"date-time":"2019-09-30T23:44:32Z","timestamp":1569887072000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["SpaMHMM: Sparse Mixture of Hidden Markov Models for Graph Connected Entities"],"prefix":"10.1109","author":[{"given":"Diogo","family":"Pernes","sequence":"first","affiliation":[]},{"given":"Jaime S.","family":"Cardoso","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1016\/j.neunet.2013.07.011","article-title":"Self-organizing hidden markov model map (sohmmm)","volume":"48","author":"ferles","year":"2013","journal-title":"Neural Networks"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WMNC.2014.6878860"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2017.2755369"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.21236\/ADA521228"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MASSP.1986.1165342"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1977.tb01600.x"},{"article-title":"Glomo: Unsupervisedly learned relational graphs as transferable representations","year":"2018","author":"yang","key":"ref16"},{"key":"ref17","first-page":"1","article-title":"An inequality and associated maximization technique in statistical estimation of probabilistic functions of a markov process","volume":"3","author":"baum","year":"1972","journal-title":"Inequalities"},{"journal-title":"hmmlearn hidden markov models in python with scikit-learn like api","year":"0","author":"lebedev","key":"ref18"},{"key":"ref19","article-title":"Adam: A method for stochastic optimization","author":"kingma","year":"2014","journal-title":"arXiv preprint arXiv 1412 6980"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.248"},{"key":"ref4","first-page":"451","article-title":"Mixture hidden markov models in finance research","author":"dias","year":"2010","journal-title":"Advances in Data Analysis Data Handling and Business Intelligence"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2011.6126500"},{"key":"ref3","article-title":"Hidden markov models and their mixtures","author":"couvreur","year":"1996","journal-title":"DEA Report Dep of Mathematics Universit&#x00E9; catholique de Louvain"},{"article-title":"Mixture hidden markov models for sequence data : The seqhmm package in r","year":"2016","author":"helske","key":"ref6"},{"key":"ref5","first-page":"2249","author":"subakan","year":"2014","journal-title":"Advances in Neural Information Processing Systems 27"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.24"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2013.0521"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-rsn.2015.0372"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2018.00227"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.2822847"},{"key":"ref20","article-title":"802.11 wireless simulation and anomaly detection using HMM and UBM","author":"allahdadi","year":"2017","journal-title":"CoRR"},{"year":"0","key":"ref22"},{"journal-title":"Discrete Event Simulator","year":"0","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.497"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.494"},{"key":"ref26","article-title":"Quaternet: A quaternion-based recurrent model for human motion","author":"pavllo","year":"2018","journal-title":"arXiv preprint arXiv 1805 06485"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.573"}],"event":{"name":"2019 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2019,7,14]]},"location":"Budapest, Hungary","end":{"date-parts":[[2019,7,19]]}},"container-title":["2019 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8840768\/8851681\/08851929.pdf?arnumber=8851929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:53:51Z","timestamp":1658080431000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8851929\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2019.8851929","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]}}}