Learn More
As a crucial security problem, anti-spoofing in biomet-rics, and particularly for the face modality, has achieved great progress in the recent years. Still, new threats arrive in form of better, more realistic and more sophisticated spoofing attacks. The objective of the 2nd Competition on Counter Measures to 2D Face Spoofing Attacks is to challenge(More)
A fundamental technical hurdle in systems neurophysiology has been to record the activity of individual neurons in situ while using microstimulation to activate inputs or outputs. Stimulation artifact at the recording electrode has largely limited the usefulness of combined stimulating and recording to using single stimulation pulses (e.g., orthodromic and(More)
Automatic face recognition in unconstrained environments is a challenging task. To test current trends in face recognition algorithms, we organized an evaluation on face recognition in mobile environment. This paper presents the results of 8 different participants using two verification met-rics. Most submitted algorithms rely on one or more of three types(More)
—The Web Service Atomic Transactions (WS-AT) specification makes it possible for businesses to engage in standard distributed transaction processing over the Internet using Web Services technology. For such business applications, trustworthy coordination of WS-AT is crucial. In this paper, we explain how to render WS-AT coordination trustworthy by applying(More)
—We present a lightweight Byzantine fault tolerance (BFT) algorithm, which can be used to render the coordination of Web Services Business Activities (WS-BA) more trustworthy. The lightweight design of the BFT algorithm is the result of a comprehensive study of the threats to the WS-BA Coordination services and a careful analysis of the state model of(More)
In this paper, we present the design and implementation of a lightweight fault tolerance framework for Web services. With our framework, a Web service can be rendered fault tolerant by replicating it across several nodes. A consensusbased algorithm is used to ensure total ordering of the requests to the replicated Web service, and to ensure consistent(More)
This paper presents our system designed for MSR-Bing Image Retrieval Challenge @ ICME 2014. The core of our system is formed by a text processing module combined with a module performing PCA-assisted perceptron regression with random sub-space selection (P 2 R 2 S 2). P 2 R 2 S 2 uses Over-Feat features as a starting point and transforms them into more(More)
In this paper, we present a comprehensive study on the threats towards the coordination services for Web services business activities and explore the most optimal solution to mitigate such threats. A careful analysis of the state model of the coordination services reveals that it is sufficient to use a lightweight Byzantine fault tolerance algorithm that(More)