{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T07:51:54Z","timestamp":1730274714217,"version":"3.28.0"},"reference-count":70,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T00:00:00Z","timestamp":1702252800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T00:00:00Z","timestamp":1702252800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,12,11]]},"DOI":"10.1109\/ism59092.2023.00062","type":"proceedings-article","created":{"date-parts":[[2024,3,20]],"date-time":"2024-03-20T18:15:52Z","timestamp":1710958552000},"page":"325-330","source":"Crossref","is-referenced-by-count":0,"title":["Complex Event Processing in Heterogeneous Domains"],"prefix":"10.1109","author":[{"given":"Fabio","family":"Persia","sequence":"first","affiliation":[{"name":"University of L’Aquila,Computer Science and Mathematics,Department of Information Engineering,L’Aquila,Italy"}]},{"given":"Daniela","family":"D\u2019Auria","sequence":"additional","affiliation":[{"name":"Free University of Bozen-Bolzano,Faculty of Engineering,Bozen-Bolzano,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2001.937608"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1997.609450"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICMI.2002.1166960"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2003.10039"},{"first-page":"1802","article-title":"Detecting stochastically scheduled activities in video","volume-title":"Proceedings of the 20th International Joint Conference on Artifical Intelligence","author":"Albanese","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2008.916991"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.852197"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.246"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.33"},{"first-page":"1628","article-title":"Finding \u201dunexplained\u201d activities in video","volume-title":"IJCAI 2011, Proceedings of the 22nd International Joint Conference on Artificial Intelligence, Barcelona, Catalonia, Spain, July 16-22, 2011","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1827418.1827427"},{"issue":"8","key":"ref12","doi-asserted-by":"crossref","first-page":"1709","DOI":"10.1016\/j.jss.2012.03.056","article-title":"Complex event processing with t-rex","volume":"85","year":"2012","journal-title":"Journal of Systems and Software"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559867"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19724-6_4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0334-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/AVSS.2008.31"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CBMI.2008.4564966"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16181-5_19"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SMAP.2008.30"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2005.1605920"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MMUL.2005.87"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2011.5893799"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2014.7051934"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2012.6206742"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW.2011.6130489"},{"first-page":"xlivi","article-title":"Tutorial: Identifying malicious actors on social media","volume-title":"2016 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM 2016, San Francisco, CA, USA, August 18-21, 2016","author":"Kumar","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433496"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2013.60"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_27"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SmartCity.2015.114"},{"first-page":"223","article-title":"Towards detecting anomalous user behavior in online social networks","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Viswanath","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.04.001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.11.018"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1920261.1920265"},{"article-title":"Resolving FP-TP conflict in digest-based collaborative spam detection by use of negative selection algorithm","volume-title":"CEAS 2008 - The Fifth Conference on Email and AntiSpam, 21-22 August 2008, Mountain View, California, USA","author":"Sarafijanovic","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.24"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6588663"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2014.05.002"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.12.009"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644899"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177110"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2015.2479616"},{"first-page":"241","article-title":"You are how you click: Clickstream analysis for sybil detection","volume-title":"Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013","author":"Wang","key":"ref43"},{"journal-title":"Computers & Security","article-title":"Recognizing human behaviours in online social networks","year":"2017","author":"Amato","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC.2014.21"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/DSMP.2016.7583573"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2618860"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2599873"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504099"},{"issue":"4","key":"ref50","first-page":"66","article-title":"Telemedicine can lower costs and improve access","volume":"54","author":"Charles","year":"2000","journal-title":"Healthcare Financial Management"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1056\/nejmp2003539"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.4103\/JETS.JETS_32_20"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-020-06025-4"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-020-01266-z"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TMI.2020.2996256"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1136\/annrheumdis-2020-218323"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-020-18684-2"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2020.103949"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.resinv.2019.12.010"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.3109\/02770909909068225"},{"key":"ref61","first-page":"115","article-title":"Bronchial asthma and desaturation\u2013assessment by pulse oximetry","volume":"32","author":"Taguchi","year":"1994","journal-title":"Nihon Kyobu Shikkan Gakkai Zasshi"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.12968\/bjon.2019.28.19.1256"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1111\/anae.13897"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/AI4I49448.2020.00017"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2023.1205766"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.2196\/41533"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.jamda.2023.02.109"},{"issue":"78","key":"ref68","first-page":"56814","volume-title":"Machine learning and internet of things to improve patient health monitoring systems","volume":"14","author":"Murali","year":"2023"},{"issue":"2","key":"ref69","doi-asserted-by":"crossref","first-page":"e13145","DOI":"10.1016\/j.heliyon.2023.e13145","article-title":"Reliability of smartphone measurements of peripheral oxygen saturation and heart rate in hypotensive patients measurement of vital signs with smartphones","volume":"9","author":"Totuk","year":"2023","journal-title":"Heliyon"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1136\/bmjmilitary-2020-001629"}],"event":{"name":"2023 IEEE International Symposium on Multimedia (ISM)","start":{"date-parts":[[2023,12,11]]},"location":"Laguna Hills, CA, USA","end":{"date-parts":[[2023,12,13]]}},"container-title":["2023 IEEE International Symposium on Multimedia (ISM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10473454\/10473455\/10473458.pdf?arnumber=10473458","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T19:37:38Z","timestamp":1711481858000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10473458\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,11]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/ism59092.2023.00062","relation":{},"subject":[],"published":{"date-parts":[[2023,12,11]]}}}