Author of the publication

Requirements for multimedia metadata schemes in surveillance applications for security.

, , , , , , , , , and . Multimedia Tools Appl., 70 (1): 573-598 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Requirements for multimedia metadata schemes in surveillance applications for security., , , , , , , , , and . Multimedia Tools Appl., 70 (1): 573-598 (2014)Designing Privacy-by-Design., , , , and . APF, volume 8319 of Lecture Notes in Computer Science, page 55-72. Springer, (2012)Integrated roadmap for the rapid finding and tracking of people at large airports., , , , and . IJCIP, (2016)Mediamill: Searching Multimedia Archives Based on Learned Semantics., , , , , , and . ICME, page 1575-1577. IEEE Computer Society, (2005)TREC Feature Extraction by Active Learning., , , , , , , and . TREC, Special Publication 500-251, National Institute of Standards and Technology (NIST), (2002)Audio-Visual Processing in Meetings: Seven Questions and Current AMI Answers., , , , , , , , , and 13 other author(s). MLMI, volume 4299 of Lecture Notes in Computer Science, page 24-35. Springer, (2006)Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption., , , and . DPM/QASA@ESORICS, volume 9481 of Lecture Notes in Computer Science, page 169-182. Springer, (2015)