Learn More
As a crucial security problem, anti-spoofing in biomet-rics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive in form of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge(More)
Automatic face recognition in unconstrained environments is a challenging task. To test current trends in face recognition algorithms, we organized an evaluation on face recognition in mobile environment. This paper presents the results of 8 different participants using two verification met-rics. Most submitted algorithms rely on one or more of three types(More)
A fundamental technical hurdle in systems neurophysiology has been to record the activity of individual neurons in situ while using microstimulation to activate inputs or outputs. Stimulation artifact at the recording electrode has largely limited the usefulness of combined stimulating and recording to using single stimulation pulses (e.g., orthodromic and(More)
—We present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used to render the coordination of Web Services Business Activities (WS-BA) more trustworthy. The lightweight design of the BFT algorithm is the result of a comprehensive study of the threats to the WS-BA Coordination services and a careful analysis of the state model of(More)
—The Web Service Atomic Transactions (WS-AT) specification makes it possible for businesses to engage in standard distributed transaction processing over the Internet using Web Services technology. For such business applications, trustworthy coordination of WS-AT is crucial. In this paper, we explain how to render WS-AT coordination trustworthy by applying(More)
In this paper, we present the design and implementation of a lightweight fault tolerance framework for Web services. With our framework, a Web service can be rendered fault tolerant by replicating it across several nodes. A consensusbased algorithm is used to ensure total ordering of the requests to the replicated Web service, and to ensure consistent(More)
This paper presents our system designed for MSR-Bing Image Retrieval Challenge @ ICME 2014. The core of our system is formed by a text processing module combined with a module performing PCA-assisted perceptron regression with random sub-space selection (P 2 R 2 S 2). P 2 R 2 S 2 uses Over-Feat features as a starting point and transforms them into more(More)
UNLABELLED Paragangliomas are rare neoplasms arising from undifferentiated cells of the primitive neural crest. We report a case of a 57-year-old patient with renal pigmented paraganglioma that was an incidental finding. Histopathological examination showed typical morphology of paraganglioma, as well as the unusual feature of large amounts of pigment in(More)
Wireless links form a critical component of communication systems that aim to provide ubiquitous access to information. However, the time-varying characteristics (or " state ") of the wireless channel caused by the mobility of transmitters, receivers, and objects in the environment make it difficult to achieve reliable communication. Adaptive signaling(More)
Porcine epidemic diarrhea virus (PEDV) is an important pathogen in swine and is responsible for substantial economic losses. Previous studies suggest that the PEDV E protein plays an important role in the viral assembly process. However, the subcellular localization and other functions of PEDV E protein still require more research. The subcellular(More)