{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:51Z","timestamp":1750307751421,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,1,31]],"date-time":"2008-01-31T00:00:00Z","timestamp":1201737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Information and Communication, Korea","award":["IITA-2007-C1090-0701-0046"],"award-info":[{"award-number":["IITA-2007-C1090-0701-0046"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,1,31]]},"DOI":"10.1145\/1352793.1352899","type":"proceedings-article","created":{"date-parts":[[2008,3,25]],"date-time":"2008-03-25T15:57:23Z","timestamp":1206460643000},"page":"506-510","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Automatic background substitution using monocular camera and temporal foreground probability model"],"prefix":"10.1145","author":[{"given":"Sooyeong","family":"Kwak","sequence":"first","affiliation":[{"name":"Yonsei University, Seoul, Korea"}]},{"given":"Ilkwon","family":"Park","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Korea"}]},{"given":"Juyong","family":"Lee","sequence":"additional","affiliation":[{"name":"KT Cooperation, Seoul, Korea"}]},{"given":"Hyeran","family":"Byun","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Korea"}]},{"given":"Guntae","family":"Bae","sequence":"additional","affiliation":[{"name":"Yonsei University, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2008,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.91"},{"volume-title":"P. H. S. Torr: Gaze Manipulation for One-to-one Teleconferencing. In Proc. IEEE International Conference on Computer Vision (2003)","author":"Criminisi A.","key":"e_1_3_2_1_2_1","unstructured":"A. Criminisi , J. Shotton , A. Blake , P. H. S. Torr: Gaze Manipulation for One-to-one Teleconferencing. In Proc. IEEE International Conference on Computer Vision (2003) A. Criminisi, J. Shotton, A. Blake, P. H. S. Torr: Gaze Manipulation for One-to-one Teleconferencing. In Proc. IEEE International Conference on Computer Vision (2003)"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2003.813285"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2005.55"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5244\/C.14.17"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"412","DOI":"10.1007\/978-3-540-71457-6_37","volume-title":"Mirage 2007: Computer Vision \/ Computer Graphics Collaboration Techniques and Applications","author":"Ahn J. H.","year":"2007","unstructured":"J. H. Ahn , H. Byun , \"Human Silhouette Extraction Method using Region Based Background Subtraction\" , Mirage 2007: Computer Vision \/ Computer Graphics Collaboration Techniques and Applications , Lecture Notes in Computer Science , Vol. 4418 , pp. 412 -- 420 , ( 2007 ) J. H. Ahn, H. Byun, \"Human Silhouette Extraction Method using Region Based Background Subtraction\", Mirage 2007: Computer Vision \/ Computer Graphics Collaboration Techniques and Applications, Lecture Notes in Computer Science, Vol. 4418, pp.412--420, (2007)"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1999.784637"},{"volume-title":"7th Int. Conf. Computer Vision, 1197--1203 (1999)","author":"Meer D.","key":"e_1_3_2_1_8_1","unstructured":"Comaniciu D. and Meer . P.:Mean shift analysis and applications . 7th Int. Conf. Computer Vision, 1197--1203 (1999) Comaniciu D. and Meer. P.:Mean shift analysis and applications. 7th Int. Conf. Computer Vision, 1197--1203 (1999)"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAA.11.003011"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/IV.2002.1028817"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018428.1020874"}],"event":{"name":"ICUIMC08: The Second International Conference on Ubiquitous Information Management and Communication","sponsor":["SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","SIGMOD ACM Special Interest Group on Management of Data"],"location":"Suwon Korea","acronym":"ICUIMC08"},"container-title":["Proceedings of the 2nd international conference on Ubiquitous information management and communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352793.1352899","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1352793.1352899","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:15Z","timestamp":1750253955000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352793.1352899"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1,31]]},"references-count":11,"alternative-id":["10.1145\/1352793.1352899","10.1145\/1352793"],"URL":"https:\/\/doi.org\/10.1145\/1352793.1352899","relation":{},"subject":[],"published":{"date-parts":[[2008,1,31]]},"assertion":[{"value":"2008-01-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}