{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T16:12:23Z","timestamp":1725552743339},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308195"},{"type":"electronic","value":"9783540315988"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596981_171","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T14:42:27Z","timestamp":1150555347000},"page":"1140-1148","source":"Crossref","is-referenced-by-count":0,"title":["Metabolic Visualization and Intelligent Shape Analysis of the Hippocampus"],"prefix":"10.1007","author":[{"given":"Yoo-Joo","family":"Choi","sequence":"first","affiliation":[]},{"given":"Jeong-Sik","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Min-Jeong","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Soo-Mi","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Myoung-Hee","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"171_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/3-540-45468-3_5","volume-title":"Medical Image Computing and Computer-Assisted Intervention - MICCAI 2001","author":"S. Bouix","year":"2001","unstructured":"Bouix, S., Pruessner, J.C., Collins, D.L., Siddiqi, K.: Hippocampal Shape Analysis Using Medial Surfaces. In: Niessen, W.J., Viergever, M.A. (eds.) MICCAI 2001. LNCS, vol.\u00a02208, pp. 33\u201340. Springer, Heidelberg (2001)"},{"key":"171_CR2","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1006\/nimg.2001.0830","volume":"14","author":"L. Wang","year":"2001","unstructured":"Wang, L., Joshi, S.C., Miller, M.I., Csernansky, J.G.: Statistical Analysis of Hippocampal Asymmetry in Schizophrenia. NeuroImage\u00a014, 531\u2013545 (2001)","journal-title":"NeuroImage"},{"key":"171_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1007\/978-3-540-39903-2_57","volume-title":"Medical Image Computing and Computer-Assisted Intervention - MICCAI 2003","author":"M. Stin","year":"2003","unstructured":"Stin, M., Lieberman, J.A., Gerig, G.: Boundary and Medial Shape Analysis of the Hippocampus in Schizophrenia. In: Ellis, R.E., Peters, T.M. (eds.) MICCAI 2003. LNCS, vol.\u00a02879, pp. 464\u2013471. Springer, Heidelberg (2003)"},{"issue":"6","key":"171_CR4","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1046\/j.1528-1157.2003.45902.x","volume":"44","author":"R.E. Hogan","year":"2001","unstructured":"Hogan, R.E., Bucholz, R.D., Joshi, S.: Hippocampal Deformation-based Shape Analysis in Epilepsy and Unilateral Mesial Temporal Sclerosis. Epilepsia\u00a044(6), 800\u2013806 (2001)","journal-title":"Epilepsia"},{"issue":"4","key":"171_CR5","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/10867651.1999.10487510","volume":"4","author":"E.A. Karabassi","year":"1999","unstructured":"Karabassi, E.A., Papaioannou, G., Theoharis, T.: A Fast Depth-Buffer-Based Voxelization Algorithm. Journal of Graphics Tools, ACM\u00a04(4), 5\u201310 (1999)","journal-title":"Journal of Graphics Tools, ACM"},{"issue":"2","key":"171_CR6","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/BF01427149","volume":"13","author":"Z. Zhang","year":"1994","unstructured":"Zhang, Z.: Iterative point matching for registration of freeform curves and surfaces. International Journal of Computer Vision\u00a013(2), 119\u2013152 (1994)","journal-title":"International Journal of Computer Vision"},{"key":"171_CR7","unstructured":"Sordo, M.: Introduction to Neural Networks in Healthcare, Open Clinical Document (October 2002)"},{"key":"171_CR8","unstructured":"Analyze 5.0 Tutorials(copyright 1999 - 2003 AnalyzeDirect, copyright 1986 -2003 BIR, Mayo Clinic)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596981_171.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:57:06Z","timestamp":1619506626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596981_171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308195","9783540315988"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/11596981_171","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}