- document
-
Schavemaker, J.G.M. (author), Spitters, M.M. (author), Koot, G. (author), de Boer, M.H.T. (author)In this paper we present a simple, novel method to use state-of-the-art image concept detectors and publicly available image search engines to retrieve images for semantically more complex queries from local databases without re-indexing of the database. Our low-key, data- driven method for associative recognition of unknown, or more elaborate,...conference paper 2015
- document
-
Schutte, K. (author), Bouma, H. (author), Schavemaker, J.G.M. (author), Daniele, L.M. (author), Sappelli, M. (author), Koot, G. (author), Eendebak, P.T. (author), Azzopardi, G. (author), Spitters, M.M. (author), de Boer, M.H.T. (author), Kruithof, M.C. (author), Brandt, P. (author)The number of networked cameras is growing exponentially. Multiple applications in different domains result in an increasing need to search semantically over video sensor data. In this paper, we present the GOOSE demonstrator, which is a real-time general-purpose search engine that allows users to pose natural language queries to retrieve...conference paper 2015
- document
-
Spitters, M.M. (author), Eendebak, P.T. (author), Worm, D.T.H. (author), Bouma, H. (author)Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming for security services to monitor all these open...conference paper 2014
- document
-
van den Broek, E.L. (author), Spitters, M.M. (author)Throughout the last 40 years, the security breach caused by human error is often disregarded. To relief the latter problem, this article introduces a new class of biometrics that is founded on processing physiological personal features, as opposed to physical and behavioral features. After an introduction on authentication, physiological signals...conference paper 2013
- document
-
Amardeilh, F. (author), Kraaij, W. (author), Spitters, M.M. (author), Versloot, C.A. (author), Yurtsever, S. (author)Domain ontologies are a central component in the Virtuoso demonstrator, a system that captures, analyzes and aggregates open news sources in order to achieve an information position that supports complex decision processes in the context of border control. However, maintenance of such an ontology is a challenging task. We demonstrate a text...conference paper 2013
- document
-
Bouma, H. (author), Azzopardi, G. (author), Spitters, M.M. (author), de Wit, J.J. (author), Versloot, C.A. (author), van der Zon, R.W.L. (author), Eendebak, P.T. (author), Baan, J. (author), ten Hove, R.J.M. (author), van Eekeren, A.W.M. (author), ter Haar, F.B. (author), den Hollander, R.J.M. (author), van Huis, R.J. (author), de Boer, M.H.T. (author), van Antwerpen, G. (author), Broekhuijsen, B.J. (author), Daniele, L.M. (author), Brandt, P. (author), Schavemaker, J.G.M. (author), Kraaij, W. (author), Schutte, K. (author)We describe the TNO system and the evaluation results for TRECVID 2013 Multimedia Event Detection (MED) and instance search (INS) tasks. The MED system consists of a bag-of-word (BOW) approach with spatial tiling that uses low-level static and dynamic visual features, an audio feature and high-level concepts. Automatic speech recognition (ASR)...conference paper 2013
- document
-
Stokking, H.M. (author), Kaptein, A.M. (author), Veenhuizen, A.T. (author), Spitters, M.M. (author), Niamut, O.A. (author)This paper describes the work in the FP7 STEER project on augmenting a live broadcast with live user generated content. This user generated content consists of both video content, captured with mobile devices, and social network content, such as Facebook or Twitter messages. To enable multi-source synchronization, all content sources need to...conference paper 2013