. . . . . . . . "The authors use computer vision mechanisms to exploit the camera network. It is stated that this is outside the scope of this paper, but they should be discussed (shortly) in this paper." . "3"^^ . . . . . . "2019-11-26T09:05:11+01:00"^^ . .