{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T14:05:03Z","timestamp":1725804303007},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/eisic.2017.13","type":"proceedings-article","created":{"date-parts":[[2017,12,28]],"date-time":"2017-12-28T16:30:02Z","timestamp":1514478602000},"page":"24-31","source":"Crossref","is-referenced-by-count":11,"title":["An Integrated Framework for the Timely Detection of Petty Crimes"],"prefix":"10.1109","author":[{"given":"Nikolaos","family":"Dimitriou","sequence":"first","affiliation":[]},{"given":"George","family":"Kioumourtzis","sequence":"additional","affiliation":[]},{"given":"Anargyros","family":"Sideris","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Stavropoulos","sequence":"additional","affiliation":[]},{"given":"Evdoxia","family":"Taka","sequence":"additional","affiliation":[]},{"given":"Nikolaos","family":"Zotos","sequence":"additional","affiliation":[]},{"given":"George","family":"Leventakis","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Tzovaras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2013.98"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2014.6836044"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2017.26"},{"article-title":"Temporal Segment Networks: Towards Good Practices for Deep Action Recognition","year":"0","author":"wang","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2015.522"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2013.01.013"},{"key":"ref16","first-page":"32","article-title":"Topological Structural Analysis of Digitized Binary Images by Border Following","author":"suzuki","year":"1985","journal-title":"CVGIP 30 1"},{"key":"ref17","first-page":"674","article-title":"An Iterative Image Registration Technique with an Application to Stereo Vision","author":"lucas","year":"0"},{"key":"ref18","article-title":"Pyramidal implementation of the Lucas Kanade feature tracker","author":"bouguet","year":"2000","journal-title":"Intel Corporation Microprocessor Research Labs"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"journal-title":"P-REACT Deliverable D5 1","article-title":"Trials results evaluation","year":"2017","key":"ref4"},{"journal-title":"P-REACT Deliverable D5 1","article-title":"Trials Scenarios","year":"2017","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1291233.1291311"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.177"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5244\/C.22.99"},{"journal-title":"Markets and Markets Report","article-title":"Video Surveillance Market","year":"2017","key":"ref2"},{"journal-title":"Fortune Magazine","article-title":"The great surveillance boom","year":"2017","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11263-012-0594-8"},{"journal-title":"P-REACT Deliverable D2 3","article-title":"Conceptual Architecture","year":"0","key":"ref20"},{"journal-title":"A20-OLinuXlno-LIME2","article-title":"Open Source Hardware Embedded ARM Linux single board computer with Allwinner A20 dual core CORTEX-A7 1GB RAM and Gigabit Ethernet","year":"2017","key":"ref22"},{"journal-title":"P-REACT","article-title":"Petty criminality diminution through search and analysis in multi-source video capturing and archiving platform","year":"2017","key":"ref21"},{"journal-title":"INTEL NUC","article-title":"Intel Boards and Kits","year":"2017","key":"ref24"},{"journal-title":"ODROID-XU3 Lite","article-title":"ODROID, Heterogeneous Multi-Processing (HMP) solution","year":"2017","key":"ref23"}],"event":{"name":"2017 European Intelligence and Security Informatics Conference (EISIC)","start":{"date-parts":[[2017,9,11]]},"location":"Athens","end":{"date-parts":[[2017,9,13]]}},"container-title":["2017 European Intelligence and Security Informatics Conference (EISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8234922\/8240751\/08240765.pdf?arnumber=8240765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T17:14:17Z","timestamp":1517246057000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8240765\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/eisic.2017.13","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}