Learn More
As amounts of publicly available video data grow, the need to automatically infer semantics from raw video data becomes significant. In this paper, we focus on the use of Dynamic Bayesian Networks (DBNs) for that purpose, and demonstrate how they can be effectively applied for fusing the evidence obtained from different media information sources. The
Ambient Intelligence (AmI) is a vision of future Information Society, where people are surrounded by an electronic environment which is sensitive to their needs, personalized to their requirements, anticipa-tory of their behavior, and responsive to their presence. It emphasizes on greater user-friendliness, user-empowerment, and more effective service(More)
This paper addresses content-based video retrieval with an emphasis on recognizing events in tennis game videos. In particular, we aim at recognizing different classes of tennis strokes using automatic learning capability of Hidden Markov Models. Driven by our domain knowledge, a robust player segmentation algorithm is developed for real video data.(More)
We propose LicenseScript as a new multiset rewrit-ing/logic based language for expressing dynamic conditions of use of digital assets such as music, video or private data. LicenseScript differs from other DRM languages in that it caters for the intentional but legal manipulation of data. We believe this feature is the answer to providing the flexibility(More)
As amounts of publicly available video data grow, the need to query this data efficiently becomes significant. Consequently, content-based retrieval of video data turns out to be a challenging and important problem. In this paper, we address the specific aspect of inferring semantics automatically from raw video data. In particular, we introduce a new video(More)
When outsourcing data to an untrusted database server, the data should be encrypted. When using thin clients or low-bandwidth networks it is best to perform most of the work at the server. In this paper we present a method, inspired by secure multi-party computation, to search efficiently in encrypted data. XML elements are translated to polynomials. A(More)
In a ciphertext-policy attribute-based encryption (CP-ABE) scheme, the data is encrypted under an access policy defined by a user who encrypts the data and a user secret key is associated with a set of attributes which identify the user. A user can decrypt the ciphertext if and only if his attributes satisfy the access policy. In CP-ABE, since the user(More)
Schema matching attempts to discover semantic map-pings between elements of two schemas. Elements are cross compared using various heuristics (e.g., name, data-type, and structure similarity). Seen from a broader perspective , the schema matching problem is a combinatorial problem with an exponential complexity. This makes the naive matching algorithms for(More)
In recent years the protection of biometric data has gained increased interest from the scientific community. Methods such as the helper data system, fuzzy extractors, fuzzy vault and cancellable biometrics have been proposed for protecting biometric data. Most of these methods use cryptographic primitives and require a binary representation from the(More)