Learn More
As a crucial security problem, anti-spoofing in biomet-rics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive in form of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge(More)
A fundamental technical hurdle in systems neurophysiology has been to record the activity of individual neurons in situ while using microstimulation to activate inputs or outputs. Stimulation artifact at the recording electrode has largely limited the usefulness of combined stimulating and recording to using single stimulation pulses (e.g., orthodromic and(More)
Automatic face recognition in unconstrained environments is a challenging task. To test current trends in face recognition algorithms, we organized an evaluation on face recognition in mobile environment. This paper presents the results of 8 different participants using two verification met-rics. Most submitted algorithms rely on one or more of three types(More)
The Web Services Atomic Transactions (WS-AT) specification makes it possible for businesses to engage in standard distributed transaction processing over the Internet using Web Services technology. For such business applications, trustworthy coordination of WS-AT is crucial. In this paper, we explain how to render WS-AT coordination trustworthy by applying(More)
UNLABELLED Paragangliomas are rare neoplasms arising from undifferentiated cells of the primitive neural crest. We report a case of a 57-year-old patient with renal pigmented paraganglioma that was an incidental finding. Histopathological examination showed typical morphology of paraganglioma, as well as the unusual feature of large amounts of pigment in(More)
We present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used to render the coordination of web services business activities (WS-BA) more trustworthy. The lightweight design of the BFT algorithm is the result of a comprehensive study of the threats to the WS-BA coordination services and a careful analysis of the state model of WS-BA.(More)
This paper presents an intelligent procurement marketplace for finding the best mix of web services to dynamically compose the business process desired by a web service requester. We develop a combinatorial auction approach that leads to an integer programming formulation for the web services composition problem. The model takes into account the Quality of(More)
This paper presents our system designed for MSR-Bing Image Retrieval Challenge @ ICME 2014. The core of our system is formed by a text processing module combined with a module performing PCA-assisted perceptron regression with random sub-space selection (P 2 R 2 S 2). P 2 R 2 S 2 uses Over-Feat features as a starting point and transforms them into more(More)