T his paper describes the Visual Privacy T ask (VPT) 2013, its scope and objectives, related dataset and evaluation approach.
This paper presents an overview of the Visual Privacy Task (VPT) of MediaEval 2014, its objectives, related dataset, and evaluation approaches. Participants in this task were required to implement a privacy filter or a combination of filters to protect various personal information regions in video sequences as provided. The challenge was to achieve an… (More)
In this paper, we describe a privacy filter proposed for the Visual Privacy T ask (VPT) 2013, as a case study to validate the efficacy of the User-Intimate Requirements and Evaluation Methodology (UI-REF). T his comprises an automated objective evaluation phase supported by a subjective user study to cross-validate and complement the results of the… (More)
D. (2011) Maybe it becomes a buddy, but do not call it a robot Seamless cooperation between companion robotics and smart homes. Disclaimer UWE has obtained warranties from all depositors as to their title in the material deposited and as to their right to deposit such material. UWE makes no representation or warranties of commercial utility, title, or… (More)
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes a policy model to specify what information flow is permitted in a computational system. The security definition, which is based on a general notion of information lattices, allows… (More)
Technology-enhanced or Computer Aided Learning (e-learning) can be institutionally integrated and supported by learning management systems or Virtual Learning Environments (VLEs) to offer efficiency gains, effectiveness and scalability of the e-leaning paradigm. However this can only be achieved through integration of pedagogically intelligent approaches… (More)